Warning: Permanently added '10.128.0.144' (ECDSA) to the list of known hosts. 2020/03/02 20:30:36 fuzzer started syzkaller login: [ 99.879230][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 99.879246][ T26] audit: type=1400 audit(1583181036.031:42): avc: denied { map } for pid=11052 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/02 20:30:37 dialing manager at 10.128.0.26:36733 2020/03/02 20:30:38 syscalls: 3018 2020/03/02 20:30:38 code coverage: enabled 2020/03/02 20:30:38 comparison tracing: enabled 2020/03/02 20:30:38 extra coverage: enabled 2020/03/02 20:30:38 setuid sandbox: enabled 2020/03/02 20:30:38 namespace sandbox: enabled 2020/03/02 20:30:38 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/02 20:30:38 fault injection: enabled 2020/03/02 20:30:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/02 20:30:38 net packet injection: enabled 2020/03/02 20:30:38 net device setup: enabled 2020/03/02 20:30:38 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/02 20:30:38 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 101.991500][ T26] audit: type=1400 audit(1583181038.141:43): avc: denied { integrity } for pid=11067 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 20:34:17 executing program 0: [ 321.495521][ T26] audit: type=1400 audit(1583181257.651:44): avc: denied { map } for pid=11069 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=100 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 20:34:17 executing program 1: [ 321.793024][T11070] IPVS: ftp: loaded support on port[0] = 21 [ 321.891720][T11072] IPVS: ftp: loaded support on port[0] = 21 20:34:18 executing program 2: [ 322.033953][T11070] chnl_net:caif_netlink_parms(): no params data found [ 322.066438][T11072] chnl_net:caif_netlink_parms(): no params data found [ 322.239016][T11080] IPVS: ftp: loaded support on port[0] = 21 [ 322.265718][T11070] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.273739][T11070] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.282116][T11070] device bridge_slave_0 entered promiscuous mode [ 322.326568][T11070] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.333793][T11070] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.341946][T11070] device bridge_slave_1 entered promiscuous mode [ 322.355417][T11072] bridge0: port 1(bridge_slave_0) entered blocking state 20:34:18 executing program 3: [ 322.372459][T11072] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.380792][T11072] device bridge_slave_0 entered promiscuous mode [ 322.427867][T11072] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.442442][T11072] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.473196][T11072] device bridge_slave_1 entered promiscuous mode [ 322.541311][T11070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.567798][T11070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.595574][T11072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.638727][T11072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.653162][T11070] team0: Port device team_slave_0 added [ 322.696694][T11070] team0: Port device team_slave_1 added [ 322.726008][T11087] IPVS: ftp: loaded support on port[0] = 21 [ 322.773805][T11070] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 322.781157][T11070] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 322.808030][T11070] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 322.825177][T11070] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 322.832168][T11070] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 322.861262][T11070] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 20:34:19 executing program 4: [ 322.875804][T11072] team0: Port device team_slave_0 added [ 322.886913][T11080] chnl_net:caif_netlink_parms(): no params data found [ 322.924496][T11072] team0: Port device team_slave_1 added [ 322.987895][T11072] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 323.002311][T11072] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 323.058602][T11072] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 323.135566][T11070] device hsr_slave_0 entered promiscuous mode 20:34:19 executing program 5: [ 323.185894][T11070] device hsr_slave_1 entered promiscuous mode [ 323.241344][T11072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 323.249622][T11072] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 323.275710][T11072] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 323.309050][T11090] IPVS: ftp: loaded support on port[0] = 21 [ 323.444368][T11072] device hsr_slave_0 entered promiscuous mode [ 323.492867][T11072] device hsr_slave_1 entered promiscuous mode [ 323.532410][T11072] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 323.540445][T11072] Cannot create hsr debugfs directory [ 323.632194][T11095] IPVS: ftp: loaded support on port[0] = 21 [ 323.643931][T11087] chnl_net:caif_netlink_parms(): no params data found [ 323.692469][T11080] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.699582][T11080] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.708208][T11080] device bridge_slave_0 entered promiscuous mode [ 323.718299][T11080] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.726829][T11080] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.735606][T11080] device bridge_slave_1 entered promiscuous mode [ 323.803735][T11080] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.818997][T11080] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.887350][T11080] team0: Port device team_slave_0 added [ 323.898009][T11080] team0: Port device team_slave_1 added [ 323.910596][T11087] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.921012][T11087] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.930164][T11087] device bridge_slave_0 entered promiscuous mode [ 323.941251][T11087] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.949362][T11087] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.957386][T11087] device bridge_slave_1 entered promiscuous mode [ 324.016038][T11080] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 324.024857][T11080] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 324.051332][T11080] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 324.075393][T11087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.089792][T11087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 324.115977][ T26] audit: type=1400 audit(1583181260.271:45): avc: denied { create } for pid=11070 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 324.128847][T11080] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 324.151632][T11080] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 324.152418][ T26] audit: type=1400 audit(1583181260.301:46): avc: denied { write } for pid=11070 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 324.179028][T11080] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 324.223317][ T26] audit: type=1400 audit(1583181260.301:47): avc: denied { read } for pid=11070 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 324.275927][T11070] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 324.360797][T11090] chnl_net:caif_netlink_parms(): no params data found [ 324.382131][T11087] team0: Port device team_slave_0 added [ 324.399263][T11070] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 324.486019][T11080] device hsr_slave_0 entered promiscuous mode [ 324.553124][T11080] device hsr_slave_1 entered promiscuous mode [ 324.592384][T11080] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 324.600294][T11080] Cannot create hsr debugfs directory [ 324.617749][T11087] team0: Port device team_slave_1 added [ 324.637814][T11072] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 324.713839][T11070] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 324.759431][T11070] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 324.857728][T11072] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 324.919048][T11087] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 324.926323][T11087] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 324.956281][T11087] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 324.970748][T11087] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 324.977915][T11087] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.004091][T11087] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 325.019039][T11072] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 325.082804][T11095] chnl_net:caif_netlink_parms(): no params data found [ 325.091740][T11072] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 325.244364][T11087] device hsr_slave_0 entered promiscuous mode [ 325.302621][T11087] device hsr_slave_1 entered promiscuous mode [ 325.342374][T11087] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 325.350072][T11087] Cannot create hsr debugfs directory [ 325.360439][T11090] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.370122][T11090] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.379984][T11090] device bridge_slave_0 entered promiscuous mode [ 325.425069][T11090] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.432196][T11090] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.440827][T11090] device bridge_slave_1 entered promiscuous mode [ 325.482414][T11090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.496597][T11090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.584378][T11090] team0: Port device team_slave_0 added [ 325.633599][T11090] team0: Port device team_slave_1 added [ 325.639544][T11095] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.647825][T11095] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.655871][T11095] device bridge_slave_0 entered promiscuous mode [ 325.691058][T11095] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.701279][T11095] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.713988][T11095] device bridge_slave_1 entered promiscuous mode [ 325.774969][T11080] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 325.825010][T11090] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 325.832115][T11090] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.858633][T11090] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 325.895773][T11080] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 325.935403][T11090] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 325.943044][T11090] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.969955][T11090] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 325.993191][T11095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 326.006587][T11095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 326.018228][T11080] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 326.113429][T11080] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 326.186979][T11095] team0: Port device team_slave_0 added [ 326.236654][T11090] device hsr_slave_0 entered promiscuous mode [ 326.282687][T11090] device hsr_slave_1 entered promiscuous mode [ 326.342480][T11090] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 326.350111][T11090] Cannot create hsr debugfs directory [ 326.367842][T11095] team0: Port device team_slave_1 added [ 326.405736][T11087] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 326.445678][T11087] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 326.534254][T11087] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 326.590306][T11087] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 326.664080][T11095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 326.671074][T11095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 326.698116][T11095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 326.726122][T11070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.740428][T11095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 326.748884][T11095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 326.775258][T11095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 326.832689][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.845961][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.878817][T11072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.935643][T11095] device hsr_slave_0 entered promiscuous mode [ 326.982734][T11095] device hsr_slave_1 entered promiscuous mode [ 327.042387][T11095] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 327.049983][T11095] Cannot create hsr debugfs directory [ 327.060342][T11070] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.082958][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.091998][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.145867][T11072] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.166674][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.177653][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.186683][T11111] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.194022][T11111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.205612][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.228862][T11090] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 327.283900][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.294112][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.303935][ T2829] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.311048][ T2829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.319589][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.328257][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.336808][ T2829] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.343928][ T2829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.362475][T11090] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 327.426909][T11090] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 327.484079][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.492043][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.501050][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.511108][T11111] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.518229][T11111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.527650][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.536572][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.547076][T11080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 327.560816][T11090] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 327.617077][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.627007][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.636139][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.648353][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.657725][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.702166][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.711078][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.719850][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.729813][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.738807][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.785904][T11080] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.793277][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.801555][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.811902][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.823180][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.830806][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.839608][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.848093][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.856925][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.888465][T11070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.902738][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.911277][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.946787][T11072] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.960311][T11072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.987301][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.996540][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.005561][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.014723][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.023545][T11112] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.030583][T11112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.038360][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.047503][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.056214][T11112] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.063486][T11112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.073110][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.114481][T11087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.131250][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 328.187715][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 328.197890][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 328.206824][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 328.215694][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.223852][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.233361][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 328.256824][T11095] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 328.319392][T11087] 8021q: adding VLAN 0 to HW filter on device team0 [ 328.327526][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 328.338261][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 328.346926][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 328.354858][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 328.371875][T11070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 328.390733][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.399650][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.408470][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 328.417038][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 328.425198][T11095] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 328.466963][T11095] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 328.525067][T11095] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 328.570565][T11072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 328.597590][T11090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.620286][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.629937][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.639628][T11111] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.646796][T11111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.656398][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.666047][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.688857][T11080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 328.722081][T11090] 8021q: adding VLAN 0 to HW filter on device team0 [ 328.729296][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.737632][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.746492][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.754847][T11112] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.761925][T11112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.770020][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.779167][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.787643][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.797095][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.838057][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.850163][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.860988][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 328.870451][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.879831][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.888576][T11111] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.895688][T11111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.903741][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 328.912439][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 328.920915][T11111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 328.970837][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.979349][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 328.989373][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.998521][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.007368][T11112] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.014852][T11112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.023351][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 329.031916][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 329.040705][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 329.048663][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 329.062607][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 329.070946][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.099138][T11072] device veth0_vlan entered promiscuous mode [ 329.121143][T11070] device veth0_vlan entered promiscuous mode [ 329.137361][T11080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.148186][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.157268][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.166341][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 329.175678][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 329.187406][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.196635][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.205964][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 329.214928][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.232631][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.240326][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.249323][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.257560][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.279190][T11070] device veth1_vlan entered promiscuous mode [ 329.291817][T11087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 329.300460][T11072] device veth1_vlan entered promiscuous mode [ 329.324826][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 329.333297][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 329.341420][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 329.352848][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 329.361388][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 329.371253][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 329.380362][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 329.388910][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.442633][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 329.450832][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 329.460578][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 329.468689][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 329.477436][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.505144][T11090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 329.535260][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 329.543144][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 329.550851][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 329.559535][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.581555][T11087] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.602234][T11070] device veth0_macvtap entered promiscuous mode [ 329.626591][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 329.637636][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.651228][T11070] device veth1_macvtap entered promiscuous mode [ 329.676517][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 329.685830][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 329.695690][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.730061][T11072] device veth0_macvtap entered promiscuous mode [ 329.762707][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 329.770794][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 329.783277][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 329.798434][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.807576][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.823572][T11072] device veth1_macvtap entered promiscuous mode [ 329.841044][T11080] device veth0_vlan entered promiscuous mode [ 329.860723][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 329.868791][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.876679][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.890552][T11070] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 329.922660][T11070] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 329.939308][T11080] device veth1_vlan entered promiscuous mode [ 329.946931][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 329.955745][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 329.965076][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.974607][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.984762][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.997560][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.006529][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.031523][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 330.043132][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 330.054687][T11072] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 330.077847][T11090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.093556][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 330.101700][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 330.123258][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 330.136689][T11072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 330.148069][T11072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 330.161320][T11072] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 330.178238][T11095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.250732][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.261173][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.270970][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 330.280420][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.290199][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.298746][T11075] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.373854][T11087] device veth0_vlan entered promiscuous mode [ 330.476803][ T26] audit: type=1400 audit(1583181266.631:48): avc: denied { associate } for pid=11070 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 330.510873][T11095] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.562011][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 330.571529][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.579825][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 330.588774][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 330.601795][T11087] device veth1_vlan entered promiscuous mode [ 330.618076][T11080] device veth0_macvtap entered promiscuous mode 20:34:26 executing program 0: [ 330.677830][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 330.709848][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 330.721046][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 330.732996][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 330.763066][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 20:34:26 executing program 0: [ 330.771534][T11102] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.778697][T11102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.791339][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 330.801763][ T2830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:34:27 executing program 0: [ 330.857014][T11080] device veth1_macvtap entered promiscuous mode 20:34:27 executing program 0: [ 330.942995][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 330.951657][T11102] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.974834][T11102] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.981936][T11102] bridge0: port 2(bridge_slave_1) entered forwarding state 20:34:27 executing program 0: [ 331.000841][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.050183][T11090] device veth0_vlan entered promiscuous mode 20:34:27 executing program 1: [ 331.102685][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 331.110929][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 20:34:27 executing program 0: [ 331.159172][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.209222][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.243440][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 20:34:27 executing program 1: [ 331.269851][T11080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.338826][T11080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.376894][T11080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.391083][T11080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.443522][T11080] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 331.461172][T11090] device veth1_vlan entered promiscuous mode [ 331.480681][T11087] device veth0_macvtap entered promiscuous mode [ 331.498016][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.509455][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.518080][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 331.526702][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.534788][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.543846][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.552447][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 331.560999][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.569962][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.578843][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.589552][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 331.625676][T11087] device veth1_macvtap entered promiscuous mode [ 331.645858][T11080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.656714][T11080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.670278][T11080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 331.681326][T11080] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.698635][T11080] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 331.710136][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 331.721372][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 331.729889][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.738829][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.747614][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 331.757872][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 331.797184][T11095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 331.810632][T11095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.822950][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.831941][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.841636][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.850357][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.861487][T11087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.872420][T11087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.884591][T11087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.896425][T11087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.907445][T11087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 331.920923][T11087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 331.933704][T11087] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 331.949319][T11090] device veth0_macvtap entered promiscuous mode [ 331.958077][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 331.967101][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 331.977160][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.989137][T11087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.000869][T11087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.010906][T11087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.021857][T11087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.033665][T11087] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.045194][T11087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.056595][T11087] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 332.084473][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.096541][T11073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.109660][T11090] device veth1_macvtap entered promiscuous mode [ 332.271454][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.279838][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 332.287521][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 332.444580][T11095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 332.454957][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 332.477751][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.488905][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 332.499495][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.509575][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 332.520708][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.530635][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 332.541263][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.554949][T11090] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 332.650090][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.659118][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.675703][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.688095][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.698991][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.709771][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.720683][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.731194][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.741162][T11090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 332.751717][T11090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 332.764225][T11090] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 332.776468][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.786686][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:34:29 executing program 2: 20:34:29 executing program 0: [ 332.992418][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.001046][T11112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.152246][T11095] device veth0_vlan entered promiscuous mode [ 333.202782][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.220700][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.232547][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.240564][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.265005][T11095] device veth1_vlan entered promiscuous mode 20:34:29 executing program 4: [ 333.341675][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 333.363974][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 333.378695][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.388122][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.408810][T11095] device veth0_macvtap entered promiscuous mode [ 333.443580][T11095] device veth1_macvtap entered promiscuous mode [ 333.501041][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 333.512089][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.523387][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 333.534069][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.544011][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 333.554498][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.565103][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 333.577403][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.588503][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 333.599585][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.610912][T11095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 333.619241][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 333.628745][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.637025][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.645874][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.657929][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 333.668770][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.679639][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 333.691563][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.704432][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 333.715210][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.725277][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 333.735829][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.746070][T11095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 333.757624][T11095] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.769019][T11095] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 333.780367][T11125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.790217][T11125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:34:30 executing program 5: 20:34:30 executing program 3: 20:34:30 executing program 1: 20:34:30 executing program 0: 20:34:30 executing program 2: 20:34:30 executing program 4: 20:34:30 executing program 3: 20:34:30 executing program 1: 20:34:30 executing program 2: 20:34:30 executing program 4: 20:34:30 executing program 0: 20:34:30 executing program 5: 20:34:30 executing program 1: 20:34:30 executing program 2: 20:34:30 executing program 3: 20:34:30 executing program 0: 20:34:30 executing program 4: 20:34:30 executing program 5: 20:34:30 executing program 1: 20:34:30 executing program 2: 20:34:30 executing program 3: 20:34:31 executing program 5: 20:34:31 executing program 4: 20:34:31 executing program 0: 20:34:31 executing program 1: 20:34:31 executing program 3: 20:34:31 executing program 2: 20:34:31 executing program 4: 20:34:31 executing program 5: 20:34:31 executing program 0: 20:34:31 executing program 1: 20:34:31 executing program 4: 20:34:31 executing program 3: 20:34:31 executing program 2: 20:34:31 executing program 5: 20:34:31 executing program 1: 20:34:31 executing program 0: 20:34:31 executing program 2: 20:34:31 executing program 3: 20:34:31 executing program 4: 20:34:31 executing program 5: 20:34:31 executing program 1: 20:34:31 executing program 0: 20:34:32 executing program 2: 20:34:32 executing program 3: 20:34:32 executing program 4: 20:34:32 executing program 2: 20:34:32 executing program 5: 20:34:32 executing program 0: 20:34:32 executing program 1: 20:34:32 executing program 3: 20:34:32 executing program 4: 20:34:32 executing program 5: 20:34:32 executing program 1: 20:34:32 executing program 0: 20:34:32 executing program 3: 20:34:32 executing program 2: socket$inet6(0xa, 0x80003, 0x6b) r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=@newlink={0x64, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8}, @IFLA_GRE_REMOTE={0x8, 0x7, @dev}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x4}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0xe69c3}, @IFLA_GRE_OKEY={0x8, 0x5, 0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) 20:34:32 executing program 4: 20:34:32 executing program 1: 20:34:32 executing program 5: 20:34:32 executing program 0: 20:34:32 executing program 3: 20:34:32 executing program 4: 20:34:32 executing program 2: 20:34:33 executing program 5: 20:34:33 executing program 0: 20:34:33 executing program 1: 20:34:33 executing program 3: 20:34:33 executing program 2: 20:34:33 executing program 4: 20:34:33 executing program 0: 20:34:33 executing program 1: 20:34:33 executing program 5: 20:34:33 executing program 3: 20:34:33 executing program 2: 20:34:33 executing program 4: 20:34:33 executing program 0: 20:34:33 executing program 5: 20:34:33 executing program 3: 20:34:33 executing program 1: 20:34:33 executing program 2: 20:34:33 executing program 4: 20:34:33 executing program 0: 20:34:33 executing program 5: 20:34:33 executing program 3: 20:34:33 executing program 1: 20:34:34 executing program 0: 20:34:34 executing program 2: 20:34:34 executing program 4: 20:34:34 executing program 5: 20:34:34 executing program 1: 20:34:34 executing program 3: 20:34:34 executing program 0: 20:34:34 executing program 2: 20:34:34 executing program 4: 20:34:34 executing program 5: 20:34:34 executing program 1: 20:34:34 executing program 0: 20:34:34 executing program 3: 20:34:34 executing program 2: 20:34:34 executing program 1: 20:34:34 executing program 4: 20:34:34 executing program 5: 20:34:34 executing program 3: 20:34:34 executing program 0: 20:34:34 executing program 1: 20:34:34 executing program 2: 20:34:35 executing program 4: 20:34:35 executing program 5: 20:34:35 executing program 0: 20:34:35 executing program 3: 20:34:35 executing program 1: 20:34:35 executing program 2: 20:34:35 executing program 1: 20:34:35 executing program 4: 20:34:35 executing program 5: 20:34:35 executing program 3: 20:34:35 executing program 0: 20:34:35 executing program 2: 20:34:35 executing program 4: 20:34:35 executing program 0: 20:34:35 executing program 1: 20:34:35 executing program 5: 20:34:35 executing program 3: 20:34:35 executing program 2: 20:34:35 executing program 4: 20:34:35 executing program 0: 20:34:35 executing program 1: 20:34:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x24, 0x0, &(0x7f0000000000)=0xe) 20:34:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000cb5ad6ae2cdd020000000000000058"], 0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000180)) 20:34:36 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3}}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 340.013701][T11421] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:34:36 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x14}) ppoll(&(0x7f0000000140)=[{r1, 0x1}], 0x1, 0x0, 0x0, 0x0) 20:34:36 executing program 1: getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3c, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') [ 340.086306][ T26] audit: type=1400 audit(1583181276.241:49): avc: denied { open } for pid=11420 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 340.140674][ T26] audit: type=1400 audit(1583181276.241:50): avc: denied { kernel } for pid=11420 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 20:34:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='./bus\x00') 20:34:36 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000140), 0x24, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fchmod(r0, 0x0) 20:34:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r4, 0x5409, 0x0) tkill(r3, 0x2b) 20:34:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x4, 0x3, 0x0, 0x9}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 340.337140][ T26] audit: type=1400 audit(1583181276.241:51): avc: denied { confidentiality } for pid=11420 comm="syz-executor.5" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 20:34:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 20:34:36 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x30, &(0x7f0000002fc0)=[{&(0x7f0000000480)=""/138, 0xfffffdc3}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f00000017c0), 0x18e, 0x0) 20:34:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x116000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000001c0)="26450f09b977080000b8fd7e0000ba000000000f3067364b0fc72d00800000c4a235372fb9800000c00f3235000400000f304a0fc75a6d2626460f09c441a972e30a36650f0104a96726420f01cb", 0x4e}], 0x1, 0x0, 0x0, 0x29) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:36 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b6"}}, 0x119) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) 20:34:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aea5, &(0x7f00000003c0)={0x80ffff, 0x0, @ioapic}) 20:34:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}, 0x0) [ 340.912828][T11102] hid-generic 0000:0000:0000.0001: item fetching failed at offset 0/1 [ 340.931505][T11102] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 20:34:37 executing program 1: r0 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x8b) 20:34:37 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000b40)=ANY=[@ANYBLOB="0b00000073797a3103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600008a8e874b73e990b400000000000000000000000000000000000000000000000000000000000000000000002b400000000000000000000000000000000000000000000100738d7a310000000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a5db3c6a0dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14a8a0800550e6a25c0ef65f60000000000000003187fafa4a1ee6ece53c67385b883a36ad24a04000000000000006a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b2dad868a53e6f5e69746a71ec92dcaa9a7dfab394286e5c81eae45e3a25b942b8da11edb578b453acac03a9d34480000000083d6d5fe4f833d4d4cfbeef0e0e62be2050000003c3298446c4b2b9c33d8a624cea95c3b3c6dd873569cf4786fc5166b0300000000001ff28d3ce3e3b8f81e34cf97c9c841cb2ef08107a9a96549e3d259df17e29ed64bd6120813f9f0344e139506701e8fdedb06009b5e4d0c67bda0b928b732cff782b0684075f2cb7851efdd7797ee95d2ac28a8cabd26c15682aa78d31aec956bd7c27806403434b3c30b070bcc8266e12fa66602056256f74675b7cb4d87b2708d70c8f3df53caf8fe180c4dea3f5b7a871b30c7a5753b48f7f09192a34b0efaab02dca0517eee50ff30206f78ec82c72f33e909c1ae1fe94fe0759f07d16402593e3335d42000888c905fb41dbdb420ea9f87fc86512685eb7261e9c25edb6095e9ec2b743bcf0f468bada0b87a02606530c278a4c6"], 0x12e) readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x1) 20:34:37 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 20:34:37 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00'], 0x1) [ 341.220171][ T26] audit: type=1400 audit(1583181277.371:52): avc: denied { cpu } for pid=11497 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 341.232254][ C0] hrtimer: interrupt took 45855 ns 20:34:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='stack\x00') sendfile(r2, r3, 0x0, 0xa808) 20:34:37 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) epoll_create(0x4000e) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x10}) 20:34:37 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0b00000073797a3103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600008a8e874b73e990b400000000000000000000000000000000000000000000000000000000000000000000002b400000000000000000000000000000000000000000000100738d7a310000000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000000000000000000000000000000000000000000000000016000000000000000000000000000000000000003b38e967ac8206eaae86b97eec0b2bed1ee23364b10d6aad5102000000e2a5db3c6a0dee4afc66d2442805201c39389a804c41c2993fc67e8a146045e14a8a0800550e6a25c0ef65f60000000000000003187fafa4a1ee6ece53c67385b883a36ad24a04000000000000006a8ab11b0a0b00e77e6c16189cfa16cbe01a4ce411378eaab7372dab5eef84c31b2dad868a53e6f5e69746a71ec92dcaa9a7dfab394286e5c81eae45e3a25b942b8da11edb578b453acac03a9d34480000000083d6d5fe4f833d4d4cfbeef0e0e62be2050000003c3298446c4b2b9c33d8a624cea95c3b3c6dd873569cf4786fc5166b0300000000001ff28d3ce3e3b8f81e34cf97c9c841cb2ef08107a9a96549e3d259df17e29ed64bd6120813f9f0344e139506701e8fdedb06009b5e4d0c67bda0b928b732cff782b0684075f2cb7851efdd7797ee95d2ac28a8cabd26c15682aa78d31aec956bd7c27806403434b3c30b070bcc8266e12fa66602056256f74675b7cb4d87b2708d70c8f3df53caf8fe180c4dea3f5b7a871b30c7a5753b48f7f09192a34b0efaab02dca0517eee50ff30206f78ec82c72f33e909c1ae1fe94fe0759f07d16402593e3335d42000888c905fb41dbdb420ea9f87fc86512685eb7261e9c25edb6095e9ec2b743bcf0f468bada0b87a02606530c278a4c6"], 0x12e) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/244, 0xf4}, {0x0}, {&(0x7f0000000040)=""/20, 0x14}], 0x3) [ 341.405413][ T2829] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max 20:34:37 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000000c0)="a68f4f79768e9039718b", 0xa}], 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000a) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x69}, 0x0, 0xfffffffffffffffe}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0xffffffff}) accept$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) connect(0xffffffffffffffff, &(0x7f0000000340)=@ll={0x11, 0xd, r4, 0x1, 0x6, 0x6, @link_local}, 0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x4e22, @dev}, {0x0, @dev={[], 0x43}}, 0x44, {0x2, 0x0, @local}, 'rose0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a80)) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) setresgid(0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x8001}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r7, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r7, &(0x7f0000000540)=ANY=[@ANYRESOCT], 0x17) [ 341.450493][ T26] audit: type=1400 audit(1583181277.371:53): avc: denied { write } for pid=11497 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 341.476129][T11517] EXT4-fs warning (device sda1): verify_group_input:150: Last group not full 20:34:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aea5, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) [ 341.529442][T11125] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max [ 341.544689][ T2829] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 20:34:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1524}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0f01"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 341.601205][T11125] hid-generic 0000:0000:0000.0003: hidraw1: HID v0.00 Device [syz1] on sz1 [ 341.686327][ T2829] hid-generic 0000:0000:0000.0004: ignoring exceeding usage max 20:34:37 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) io_submit(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="042331b9d3d8beea53", 0x9}]) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x15c}) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:34:37 executing program 1: newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x0) geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, 0x0, 0x0) geteuid() [ 341.775000][ T2829] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on sz1 20:34:38 executing program 4: symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) unlink(&(0x7f0000000280)='./file1\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x3fffffffffffe66, 0x0) 20:34:38 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\vem-M\\\x00'/19, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000000400000000000000810000000400"], 0x12) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) 20:34:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x8082) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000004c0)=0x68) 20:34:38 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)={[{@type={'type', 0x3d, "6b009e1f"}}]}) [ 342.205090][ T26] audit: type=1400 audit(1583181278.361:54): avc: denied { map } for pid=11559 comm="syz-executor.0" path=2F6D656D66643A0B656D2D4D5C202864656C6574656429 dev="tmpfs" ino=42042 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 20:34:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x100000000006}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r1, 0x0) write$9p(r0, &(0x7f00000003c0)='-', 0x1) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 342.336782][T11569] hfsplus: type requires a 4 character value [ 342.375652][T11569] hfsplus: unable to parse mount options [ 342.429528][T11569] hfsplus: type requires a 4 character value [ 342.442320][T11569] hfsplus: unable to parse mount options 20:34:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$nbd(0xffffffffffffffff, 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008182000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000f2ffffff000000000000b6"], 0x119) write$UHID_DESTROY(r2, &(0x7f00000000c0), 0x235) 20:34:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='./bus\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)={0x0, @rc={0x1f, @any, 0x9e}, @rc={0x1f, @any, 0xff}, @isdn={0x22, 0x3, 0x5f, 0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)='team0\x00', 0x6, 0x5, 0x6}) getuid() ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)={0x20, 0x2, 0x2, 0x7b, 0xd639, 0x7ff}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000002c0)=0xe8) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r3, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xd5, 0x2}}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) prctl$PR_GET_DUMPABLE(0x3) 20:34:38 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, 0x0) 20:34:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000040)) [ 342.620246][ T26] audit: type=1400 audit(1583181278.771:55): avc: denied { map } for pid=11576 comm="syz-executor.1" path="socket:[42075]" dev="sockfs" ino=42075 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 [ 342.781236][ T2829] hid-generic 0000:0000:FFF20000.0005: item fetching failed at offset 0/1 [ 342.820302][ T2829] hid-generic: probe of 0000:0000:FFF20000.0005 failed with error -22 20:34:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aea5, &(0x7f00000003c0)={0x80ffff, 0x0, @ioapic}) 20:34:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) 20:34:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="b805000000b9ef0000000f01d9b9cf0200000f32f30fc77116b8003000000f23c80f21f8350c00a0000f23f89aae0000001d0066baf80cb890a66089ef66bafc0cb8e5790000ef0f1e200f7626660f3882bc061d0000000f01ca", 0x5a}], 0x1, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="b805000000b9ef0000000f01d9b9cf0200000f32f30fc77116b8003000000f23c80f21f8350c00a0000f23f89aae0000001d0066baf80cb890a66089ef66bafc0cb8e5790000ef0f1e200f7626660f3882bc061d0000000f01ca", 0x5a}], 0x1, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:41 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@dstopts={0x0, 0x20e2}, 0x8) 20:34:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x44a, &(0x7f0000000000)={@broadcast, @random="8bbb06576790", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x400, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "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"}, {0x1, 0x1, "6fdbbd2038e7"}]}}}}}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 20:34:41 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) [ 344.989651][T11623] IPv6: addrconf: prefix option has invalid lifetime [ 345.023069][T11625] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 20:34:41 executing program 4: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000380)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}}, 0x120) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@empty}}, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x800) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0), 0x0) syz_genetlink_get_family_id$nl80211(0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) [ 345.039021][T11630] IPv6: addrconf: prefix option has invalid lifetime 20:34:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup2(r0, r1) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) 20:34:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='./bus\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-'}, 0x16, 0x0) 20:34:41 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002840)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x100, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}, 0x90) 20:34:41 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x15b}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) sendmsg$netlink(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:34:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) r2 = dup2(r0, r1) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)=0x9) 20:34:41 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8f"], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="ea004000000000008741c45482427a7b209539e6416959ac191167d141b181a30d52d206ded6b720e7565e950964ab298c789c394e50ae2adecc"], 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 20:34:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fstatfs(r2, &(0x7f0000000280)=""/118) 20:34:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x116000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="b805000000b9ef0000000f01d9b9cf0200000f32f30fc77116b8003000000f23c80f21f8350c00a0000f23f89aae0000001d0066baf80cb890a66089ef66bafc0cb8e5790000ef0f1e200f7626660f3882bc061d0000000f01ca", 0x5a}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3e7) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:41 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000080)=0x2, 0x1b4) sendto$inet6(r0, 0x0, 0xfffffffffffffe42, 0x0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2000) ioctl$SIOCGSTAMP(r0, 0x8907, 0x0) 20:34:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) r2 = dup2(r0, r1) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)=0x9) 20:34:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@fat=@debug='debug'}]}) 20:34:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 345.867578][T11689] FAT-fs (loop4): bogus number of reserved sectors 20:34:42 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) epoll_wait(r2, &(0x7f0000000380)=[{}], 0x17cc, 0x2d55) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:34:42 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 345.938529][T11689] FAT-fs (loop4): Can't find a valid FAT filesystem [ 346.068987][T11689] FAT-fs (loop4): bogus number of reserved sectors [ 346.091597][T11689] FAT-fs (loop4): Can't find a valid FAT filesystem 20:34:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x0, 0xfffffffb}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, '\b\x00'}) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r2, r0, 0x0, 0x6f0a77bd) 20:34:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e00000146525754302000000000000682c2db43d6bd6168ad12e856a81f5382f71c78f78c0383b2e9f4e9f775fbbcab9e72ea20c6e8739d8f184347a909c376fcfaf620337ed6570b705637ccec659d21567948466467724b6d29fd2767a6273577042429fe8e155bee400"/118], 0x18) 20:34:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000480)='./bus\x00', 0x0) 20:34:42 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8248af11cedaf99c73"], 0x9) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x7fff, 0x0) 20:34:42 executing program 5: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000000000, 0xca}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 20:34:42 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "184dd34be1834dac"}) 20:34:42 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af22, &(0x7f0000000100)={0x0, r2}) 20:34:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x8082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKDISCARD(r0, 0x1277, 0x0) 20:34:43 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x20000000}) ppoll(&(0x7f0000000040)=[{r2, 0x4001}], 0x1, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:34:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) pipe2(&(0x7f0000000140), 0x80000) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x15c}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:34:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="10b8776b4606ae17e75ed6b252c9409341c662b89949a8a031a44cf3ecfe2191b71fff5e9771d545b62df46ff679abd768c06ee8444a2631c32b9209af", 0xfffffcb2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200)="fec7a10759bced5f4a61f8571d02da7f3d2edf727143d3a3546a313bc7ad33ac33b2c90a1f7526d842e8fcd95cc5fbe4af4f1ed4acc3fd1535723b4f525c8847d6ab1703d9b938ffa437ccab0fa2eaef60fb10fe06a6f28c3ad97e00d5b772b9b1cd665d81bc3e38558d1ee83045b824cffd2ee33a337f09f606f6a2fbcebe0057a8739e943b228ea14b4d2e2cccb72895e406a0520115315f68413af0317443b93c7f2a914ab35c48b9c3", 0xab, 0x1091, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000300)}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)="d2dfe896f2d785b4198556348b5a82adff3cb5c416d19c625e3d08d1e6685ca76a751d9672d8ceaa548ef8f9d811b405a8e3fc0f4a", 0x35, 0xb4, 0x0, 0x1}]) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000003c0)="0f34cc5c3bead3212981095b65f010317c0f61250176481e5d77028a0301bae09019dca740f50d50222f785bcf5f5261", 0x30}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x15c}) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:34:43 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x69}, 0x0, 0xfffffffffffffffe}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1a7) io_submit(0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a80)) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000840)) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYRESOCT], 0x17) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="d3fd481a21721661d1c17a6ddcc01cd93a4475cdc147fc63e829986a82c7d65f57ac6ebd6b50465dde91", 0x2a, 0x20000005, 0x0, 0x0) [ 347.035955][ T26] audit: type=1400 audit(1583181283.191:56): avc: denied { block_suspend } for pid=11747 comm="syz-executor.4" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 20:34:43 executing program 0: syz_emit_ethernet(0x436, &(0x7f0000000000)={@broadcast, @random="8bbb064d8980", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x400, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "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"}, {0x0, 0x1, "6fdbbd2038e7"}]}}}}}}, 0x0) 20:34:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='./bus\x00') link(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./file0\x00') 20:34:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x17ab41, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 347.302989][T11775] IPv6: addrconf: prefix option has invalid lifetime [ 347.331124][T11775] IPv6: addrconf: prefix option has invalid lifetime 20:34:43 executing program 1: r0 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x8b) 20:34:43 executing program 2: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) 20:34:43 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x3}}) close(r0) 20:34:43 executing program 2: r0 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 20:34:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000000)='./file0\x00', 0x1070c5, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FITRIM(r1, 0x40047211, &(0x7f0000000040)) 20:34:44 executing program 4: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) [ 347.906810][ T26] audit: type=1804 audit(1583181284.061:57): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir013317093/syzkaller.HrHta8/43/file0/file0" dev="sda1" ino=16633 res=1 20:34:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, 0x0) 20:34:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@empty, 0x15c}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:34:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/psched\x00') sendfile(r2, r3, 0x0, 0xa808) 20:34:46 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) pipe(&(0x7f0000000200)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="000637620003555e5689d91b59672a8a298a7dd8a16795e08348c14dadc3cab5ed450fe2f2ea32a8944ae6a23e220ad9d351dfe3e71bf8c7784a744eaf295764d3c9f91d5fe01d83d1347d06a30b65ef3b9726b72d3999f59b85afa20c6e8e6bc42bc9f946007bac5f21a77598dd047eda5b419f13"], 0x75) sendfile(r0, r0, 0x0, 0x8080fffffffe) ioctl$TIOCSETD(0xffffffffffffffff, 0x7b9, 0x0) 20:34:46 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000001740)=ANY=[@ANYBLOB="020d0000100000002f3144e80000000803000600072000000200010000000000000000f5000000000800120002000200000000000000000030006c00020300060000000000f9acb20200000000152c000000000000000001020014bb00000000df0000000000000003000500002000000200ed00e000000100800083e30f510b9d8efd6eadf31561988c77cf152ea8bb43ddbd7d03dac7f445a652d3f8b063daeb15b11d0cd437fb95e225eaf3e135233a82492096ff1c17d5c647067080641d4c75fe6f4ede5fb105595685190900000000000000f93a0fcc835820d96008f866fb4d28bc7ef9f8062f9db5f76626089cdcfd0c171bcfbe868c603d7f8542cbd8c5d2e39b90ddf7f6d9525cbc5b20d8b6f661130c526af0320ad36f005f535d7e160b5669dd7f1237cc0f7d1d35826f68073a437965d66df2f2d4bff069f7d039c721484d89f3684064363829139df6b4be76fb04ad9ec5cf2faf907a440931d08e9e5dd7b8597e57292ac7c4f1982cf40045d0f4431963df216018cd09bb08ad3d5892b7b45695d5f782adaeac178f69a3247fd3bf2ef5d6862908eb0cd1f08974add39b3dc0c419ab6cdf8741796365ff5febc5acc75fc049d032b828fbbfb2a1f86bd5ddac8b0c34a65f46d7a939862a1dd88b855e8cc356e15f6ddcef472fd05cfdde4f9efd85a700a7ef39946f797fa96bacfd15ccb9a902c486c3ea0b529fd45c29361d88fda11012e9616ab06bae592ec35a1dcd31b31fc681004c32755b47c73cedf0d211c8f97e5d1b5f3a1e7cd20b3bc7b000c02edef7a48db21b1bed2250f1e1044d4e9d018bb02ac2f8a22b834cbf73c16ec0bfeba144e362c08960124b6fe745d74627375905fb38e5a8c45f25798ae810381e8aacd2f459fd15e813a5833c070762c2c54695669ac80f00007d4f00bda40a0b82bdea00970e7e3c4bc415bad58368aadb6dd179da093b760f40ac2cf674dde3642c6052c14c275fe321612006d2ce4d6fe600a954494b97e133e35b414d50f9f02fda424a59147ffdeef8dd0406e0ce4e4150ab927c7020281ac2aeb90710f5c72159f40e573e1a98bdbd45014c882cf185b11003924150ce0e90cf060e75669e11b52980b0215dd874f8c7b77a5510000000000091537ac62a93d30b3a03af813137fdbe437ebeb3bb1465e146df3b1db40c941e7b3fb95d05ac7ebe7f649913a1ee2331d19616d5073260fd7a024754feced7322c087dd0aabb28deacf04ba53888e748cd3e33784ef870a1d077ed042e179fd1e4cc4af0e2855f4bb4f7fde1c5d12bf1a78dc660fa6c017b999b67232f0f6175fc29982ca2575fb4c77fcc05dba8003d73e8ca7ad22dcc2ca740abe85333a175ee124e511f41e1130c47049c000000000000000000c1ff1ff607ce12f96cc854450e914e30db640a5f465cc343ed4d15e0ac010000801e35dda2b48c0e503239e0265c079ec700b7eda23f2f816e53a2eafd99b6c21df716ba011af218c828e68c9083ea03480a1be36aa1a3f1c79cfee450d10c62d09408d0d14e0b30d24f0c2deeafcb544402848780ff33723b157000001400000000090d238bac9a91b376db1d820326851f1615ed405b02ee06a41ee4532067cc12dddd74bfe3125c15e35a004f7492b5d4ec1ceb546bbe7503461103c6b88e4c2c5404ca83316b4595bba59615a89cefde2646aad0272edf93d7d55813f1c5c33073ffe5d1f3e27db32999c569753dbfe869792694de40fba09e4ac97ffc2a483e61ca89e152784d1e7a824eba0884b04d731de8193a73d342a727d9703cb71b770504deeece71fcf92af35a4873c733a6b348f4bc2aaaf5793bca3250ddedce674afa46777067af12160cb8b85951bf8a13c51d983b22c03db12b929c9bde8ea3cc4ce4120a09713a1d3dd37e200a2dd71949ed8dd0755125a8a4a1e22815000000001f4b50387a973cc0056f8f000000100083822a960c2edce5c20b0f07d0ef9559824b89a21e140e577b68eee02882861fc51a820e497b18d9059e3f4a051ac5844f0f840adcb6f0f6404d1df9b25f2fbdf9fbfdb4c352000000000000000000000000000098d99fb576a0072c729b65786543970ce2caa3a6b34b8680c1a86cc43f2dcd50a3a11ce0e4465d44e915e193650b7b4c3ba12e302273199da56dc8400eb8bb52cc02a419f7d562a39aa9fac91748f5e0020d80fea7eb107887e4887031687120d0452bf79b0523d190ce81cd624ab277368148a84f188ffbb6e4e54509b8bc28534d5a53170de82c75371baa0d7a62ba7466694c218df1a3a56d750c87c5f5bd5267e674c6821b5763f51e5b93fdf27b9af9f8d2035d73aa75613e3d165c516242134c74aaf00a001d537b9f9cb36a9711f2324d8b63d86733e6301fcd900080000000000700000000000000cd1aa4782917712e2138bdffbae1a91a7cdf4ed2732fc3a38dab24b686abedc9687602eedd6781f6a0b3e8c0d732acd1b417fdf6a292c838882682a19257d4abb35904c85fe7eb7b056fc61c13a743060da27e660715a66c722b41888c506546cb03ed2f3898ec397056bca0ae791384990b2dd17189813597dabbfdec6f7e410a02d244559ae16891fbb4c2bedb30faeaf1e686c73266dc03821c353a264cfef33e41a36f3d6cf4933afac85f82dcfa3fe9da324c9ded7c9647008d346412cd5f5dbf8bc1cce31935f224dff5957fb1dcb64ece06dabc97ecf0fa7c537a85ecefd36d1ba442eae1a76dec02ae119af97300f0620b1425e257cf997d11e6824398b8a3351e79cb6f05ba59e44df4f4180bf7cb3b4127518838049d5cc2c41c430cdbd99a2b92b70000000071f74789f42fee46a7578af24e2bb59cfc5f1c222193ae73a34deb551a95fc1aaea210972428cb3eb5ec9138c2a5bc15712a9b2feb6fb8050067e0d694b8dae92e92108a63ede2729437ea72981cb3bf7715002edad4c02ac032a219bf8abec06550e0ab6a4a9f529c1b740be5795b702b0b05a954187f6b9211cfb04b3d8fb028a78828d1e339214a8b277a1185c9258573324619963b4d3cd14b3f27ad3ede0215a5195bf7d5047f8dbfdb848b888009583d4eafc8f52c8bd999f61cd917db25f825d2de4ae945fc53c9c94502ed7142c2feb1129b874714329e0008786cdabd0000000000000000000000008b553dde406b256e9d58d2f0b8c48933e308e1c786e3f4a47ff875d0e989594462c65d338ad68d7ff7ca7becbc16d1f9f00cad5de25882367d92cb0f5a1be8ddc463c587f4855b4184fa307dda329426804b0766ca645ae4770057c51f29c0811e9400cc0355a8aa9cfb4595066e1dc69b3964312c112c1989fec48717b9cab47f8dcbe62dc32916818c0ad3c0c4b7c6f3403f5a97fa743ee179a02dc858cc678517ac21cbb60a02e8db310e2eeb9e9ab1527119aa81a89aa3568db979db7bc72a4da5ada8c8e934f1e8cf34bac689e6417d1945ed22f03fdd9570d149dd8da7fce3e8d820705efe3ed26115e6cd148c1962e37d22a1896bb88ee7e1f1063f2cdbf3a2b700bfa237410b9e9b563552a6d3105d02906e7daef7a87d4526758c376b613e25156257d76daa0fc1bcd5a52663cc350b5a7e0b0063d9047c85c8ea97c1a5157547b37054c862f3952f8cc297028c4e8e12f6089886d5dcfb5f36245f70f17ed13282acb90f30e3c6eaa6af7b3f3607b6710539927208ff61a7d2631d0ab51aaa96f9159b0cba9f2f036d93373a9039fffc6eac868e87a0ec58719097309c4b38f72c49d375b61e198721a8ef670381b7912bcfd405fc705eead003bb73dd20405cc686b3d4f2ad7dec2dde84954838324f51cd6ba481a69bafdfa66d20da159e066f890b6989441d06b147ce6e1c25f7c199f5d9eebb0ec1922a658774b6b8ae92486b4e5e84da515e6092f9e2b97e7cf43de3bbe43d7e499185cf3ea4b2dab25fff22"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000180), 0x400000000000017, 0x0) 20:34:46 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x14}) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) epoll_wait(r2, &(0x7f0000000380)=[{}], 0x17cc, 0x2d55) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:34:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000000c0)=0x8b) 20:34:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, 0x0) creat(&(0x7f0000000480)='./bus\x00', 0x0) lremovexattr(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00') 20:34:46 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) write$binfmt_aout(r0, &(0x7f0000001380)=ANY=[@ANYBLOB='\x00'], 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 20:34:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$tun(r0, &(0x7f00000003c0)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2, 0x0, 0x6, 0x0, @loopback, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}, 0x32) 20:34:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)="e6abe665f4565e715cbd650acaea4aac43172f73d6630019b45a38ab1aa97f357bc4906ae09659119d07616ed1e344b1380aab4fc0c04f801a545d91d1ecbb1b95ab4fe62e07f1b5a7e316b4ce6b4b8339198fbe8d9ce1de8e5ccaf99e0bb3434619dbe4581fec2c901fc0d2ade77d38f2d2323faedec6a77fa629120d795fb5e846015ad57bca0926c0acc7d263c04a", 0x90) 20:34:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000040)={0x5}) 20:34:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000040)={0x5}) 20:34:49 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)='U', 0x1}], 0x1}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 20:34:49 executing program 1: r0 = memfd_create(&(0x7f0000000180)='#\x00', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) 20:34:49 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x1) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000000)=0x8, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xfffffffffffffffe, @remote}, 0x1c) 20:34:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10012, r0, 0x0) 20:34:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000040)={0x5}) 20:34:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = inotify_init() r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_DEBUGREGS(r5, 0x8400ae8e, &(0x7f0000000080)) 20:34:49 executing program 2: r0 = memfd_create(&(0x7f0000000180)='#\x00', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8) 20:34:49 executing program 4: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)) 20:34:49 executing program 1: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)={0x0, @aes128}) 20:34:49 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) io_submit(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="042331b9d3d8beea53", 0x9}]) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x15c}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:34:49 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, &(0x7f0000000340)='\x9a\xafv&\xe8\x01\x9b\xfb\xd3w\xcc\x1e\xb3R\xa2\xd8Uj\x95\xafe\x0e\xd9\x8c\xcaDQ\x847*p\xc9s\\\xd5N1\x12\x93+\xf6\xc4\f\xab\x04\x98\xf2VW\x19\x95\x95\x9e\xe1/__:\xb6\xa8\xeb\xceE\xda\xee\xe88,\xd6\xd8\x0eI\xbd\xc1\xae\xb6A`+K\xb8\x1b\xb1\xfd\x96\xc8\xce\xbb\xef[$\x11\xe2\x8cg\xbd,\xb3\xa2\n\xd4\xf9\xed\xb6_?5\xaf\x85q\xb5\xc1]S\xb9\x88\x1e\xfe\xb8f%\xedJ]\xf3l?>n\x9cx\xf9\xa0{\xf6)-\f\x17\r\xb0\xe3w\x12\xfe\xce\fb\x9a%\x1aT:\xda0/+\x86\x92\x11\xa0\x8d?\x89\x15\b]\xbd\x8d\xed+\xcc\xbb\xbf\xf8\xecz0l\'Z,-z\xd9\x88\x1e\xc2\xa2Tn\x83\x97-b\x98\xe8$i\x96\xa4#n-\xe1\xb9W\x05\x83+\xb9\xd9\xeb\xa1\x83\xe6\xfc\xad\xc0t\x80w\xdc3\x895\x80N\x8aa\xcb\xe1\x9b\x84;\xb5\xabF\xb7\xe9x\xc5\xa0\xd7\x16IR@\x92\x1a\x98\xb9F}\xfay\xe4\x80\xf5\x01\xed\x9f\xf0\xb6\xb5\xe4aE\xa3s\xd7\x92O-\xf4\xe4{Ji\x01\xa9\x9cd\xf3\x0e\x19\xe7\xe1Xw\x12B') 20:34:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='personality\x00') sendfile(r2, r3, 0x0, 0xa808) 20:34:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[], 0x0, 0x200}) r3 = dup(r1) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f00000004c0)={0x1, 0x0, @pic={0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xc1}}) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:49 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 20:34:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x2}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xa808) 20:34:50 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0xa0040, 0x0) fcntl$setlease(r0, 0x400, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setuid(0x0) 20:34:50 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) io_submit(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="042331b9d3", 0x5}]) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x15c}) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:34:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0x42e, &(0x7f0000000000)={@broadcast, @random="8bbb06576790", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x3f8, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "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"}]}}}}}}, 0x0) 20:34:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x6c, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x7, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {0x689}}}}}}, 0x0) 20:34:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00') sendfile(r2, r3, 0x0, 0xa808) [ 354.124803][T11947] IPv6: addrconf: prefix option has invalid lifetime [ 354.140316][T11950] IPv6: addrconf: prefix option has invalid lifetime 20:34:50 executing program 1: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 20:34:52 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x73e, "8e6c618359a73d7fbd4de1b3c384744b8939c7ddf21cbe0aaa4527dd746de853"}) 20:34:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') sendfile(r2, r3, 0x0, 0xa808) 20:34:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000cb5ad6ae2cdd020000000000000058"], 0x8) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f0000000100)) 20:34:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r2, 0x5409, 0x0) 20:34:52 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) io_submit(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="042331b9d3", 0x5}]) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xec}], 0x1000000000000409, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x15c}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 20:34:52 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}]}) 20:34:52 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) socket$unix(0x1, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) pipe(&(0x7f0000000000)) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) creat(&(0x7f0000000200)='./file0\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000240)="0f34", 0x2}], 0x10000000000002d1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{}, {}, {r2}], 0x3, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/65, 0xc}], 0x2, 0x0, 0xfffffffffffffff5, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:34:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x15}, {0x80000006}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xa808) 20:34:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') sendfile(r0, r1, 0x0, 0xa808) 20:34:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpid() sched_setattr(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x1}, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) 20:34:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xf63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) epoll_wait(0xffffffffffffffff, &(0x7f0000000340)=[{}, {}, {}, {}], 0x4, 0xa3) msgctl$MSG_INFO(0x0, 0xc, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0), 0x10) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket(0x0, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, 0x4, @none, 0x5b, 0x2}, 0xe) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)={0x1000, 0x1000, 0x2}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/diskstats\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000480)) write$P9_RSTAT(r3, &(0x7f0000000040)={0x68, 0x7d, 0x1, {0x0, 0x61, 0xffff, 0x0, {0x0, 0x3}, 0x80300000, 0x2, 0x0, 0x6, 0x10, '/proc/diskstats\x00', 0x10, '/proc/diskstats\x00', 0xe, 'vboxnet0!/ppp0'}}, 0x68) flock(r3, 0x9) 20:34:53 executing program 1: symlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./bus\x00') unlink(&(0x7f0000000000)='./bus\x00') 20:34:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLINK(r0, &(0x7f0000000000)={0x7}, 0x7) 20:34:53 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000000)={@broadcast, @random="8bbb064d8980", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000014", 0x18, 0x3a, 0x0, @remote, @mcast2, {[], @mld={0x84, 0x0, 0x0, 0x0, 0x0, @rand_addr="9c5b5a8d1d04c9bf836d3dd00bce15af"}}}}}}, 0x0) 20:34:55 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x200}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 20:34:55 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="77198248"], 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x2, 0x3a) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x2) fcntl$setstatus(r3, 0x4, 0x6900) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) 20:34:55 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0xa0040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:34:55 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="ea004000000000008741c45482427a7b209539e6416959ac191167d141b181a30d52d206ded6b720e7565e950964ab298c789c394e50ae2adecc"], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=@dstopts, 0x8) 20:34:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="b805000000b9ef0000000f01d9b9cf0200000f32f30fc77116b8003000000f23c80f21f8350c00a0000f23f89aae0000001d0066baf80cb890a66089ef66bafc0cb8e5790000ef0f1e200f7626660f3882bc061d0000000f01ca", 0x5a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0x8}, {0x80000006}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xa808) [ 359.751271][T12045] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:34:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38010000100001030000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000200bb00000000000000000200000700000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000010000000033000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000000000004800010073686132353600"/240], 0x138}}, 0x0) 20:34:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) 20:34:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000180)="e6abe665f4565e715cbd650acaea4aac43172f73d6630019b45a38ab1aa97f357bc4906ae09659119d07616e6ae344b1380aab4fc0c04f801a545d91d1ecbb1b95ab4fe62e07f1b5a7e316b4ce6b4ba339198fbe8d9ce1de8e5cf49d9e0b7d380fd3323faedec6a77fa629120d795fb5e846015ad57bca0926c0acc7d263c04afa423c7710867332", 0x88) 20:34:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db500800000000000008f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047666865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)) 20:34:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1070c5, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000040)={0x5}) write$9p(r1, &(0x7f0000001400)=';', 0x1) 20:34:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0xfffffefc) mlockall(0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 20:34:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x44a, &(0x7f0000000000)={@broadcast, @random="8bbb06576790", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x400, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1"}, {0x0, 0x5a, "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"}, {0x1, 0x1, "6fdbbd2038e7"}]}}}}}}, 0x0) 20:34:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) 20:34:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = inotify_init() r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_DEBUGREGS(r5, 0x8400ae8e, 0x0) 20:34:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f00000001c0)="0f01c866b9800000c00f326635000800000f300f011d9a0900b2000f20d86635080000000f22d8b825010f00d026360fc73866b8fb7f00000f23c00f21f8663500000f000f23f80f20d86635080000000f22d861", 0x54}], 0x1, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 360.605429][T12095] IPv6: addrconf: prefix option has invalid lifetime 20:34:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:57 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r2 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x69}, 0x0, 0xfffffffffffffffe}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(0x0, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000040)={0xffffffff}) accept$packet(r4, 0x0, &(0x7f0000000480)) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}}, {0x306, @dev}, 0x0, {0x2, 0x0, @local}, 'rose0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000a80)) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) setresgid(0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x8001}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r7, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) syz_open_procfs(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000005, 0x0, 0x0) 20:34:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:57 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:34:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:57 executing program 1: r0 = memfd_create(&(0x7f0000000180)='#\x00', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000200)={0x0}) 20:34:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000100)=0x8, 0x4) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:34:57 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x10}) 20:34:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000031, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0x40047211, &(0x7f0000000040)) 20:34:57 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x235) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x1) [ 361.556189][T12156] EXT4-fs warning (device sda1): verify_group_input:150: Last group not full 20:34:57 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 20:34:57 executing program 1: r0 = memfd_create(&(0x7f0000000180)='#\x00', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) [ 361.668719][T11073] hid-generic 0000:0000:0000.0006: ignoring exceeding usage max [ 361.703462][T11073] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on sz1 20:34:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x28}}], 0x1, 0x0) 20:34:57 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x12e) write$UHID_DESTROY(r3, &(0x7f00000000c0), 0x235) readv(r3, &(0x7f0000000480)=[{&(0x7f0000000100)=""/244, 0xf4}], 0x1) 20:34:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') sendfile(r2, r3, 0x0, 0xa808) 20:34:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r2, 0x3a, 0x1, &(0x7f0000002000), 0xce) 20:34:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8f"], 0x1) write$P9_RWALK(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="007d32229a980202"], 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="ea004000000000008741c45482427a7b209539e6416959ac191167d141b181a30d52d206ded6b720e7565e950964ab298c789c394e50ae2adecc"], 0x8) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) 20:34:58 executing program 2: symlink(&(0x7f0000000080)='./bus\x00', &(0x7f0000000000)='./bus\x00') link(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./file0\x00') [ 362.056705][T11102] hid-generic 0000:0000:0000.0007: ignoring exceeding usage max 20:34:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x28}}], 0x1, 0x0) [ 362.098137][T11102] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on sz1 20:34:58 executing program 0: mknod(&(0x7f0000000080)='./file0\x00', 0xc000, 0x0) 20:34:58 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) 20:34:58 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000cb5ad6ae2cdd020000000000001a2a6d0b8e1a7895a0e4b98dcd"], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f0000000180)) 20:34:58 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:34:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x28}}], 0x1, 0x0) 20:34:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000001c0)) 20:34:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x116000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000040)="400f30d14ae2d28700000000360f01cb2e0fc79ab68ac56e410f01ca450f01c466baf80cb840ce1c8bef66bafc0cb804000000ef2ef3410f01f80fc75d00", 0x3e}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3e7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:58 executing program 0: symlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./bus\x00') readlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)=""/186, 0xba) [ 362.752381][T12225] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 362.762047][T12225] EXT4-fs (loop1): bad geometry: block count 1080 exceeds size of device (1 blocks) 20:34:59 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x14104a, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) 20:34:59 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x14}) ppoll(&(0x7f0000000140)=[{r2, 0x5c}, {r0}], 0x2, 0x0, 0x0, 0x0) epoll_wait(r2, &(0x7f0000000380)=[{}], 0x17cc, 0x2d55) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:34:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./bus\x00') readlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)=""/186, 0xba) 20:34:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000000)='./file0\x00', 0x1070c5, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$FITRIM(r1, 0x40047211, &(0x7f0000000040)) 20:34:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:34:59 executing program 3: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000006}) epoll_wait(r1, &(0x7f0000000380)=[{}], 0x17cc, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:34:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) dup3(r0, r1, 0x0) 20:34:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000000)='./file0\x00', 0x1070c5, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$FITRIM(r1, 0x40047211, &(0x7f0000000040)) [ 363.265463][ T26] audit: type=1804 audit(1583181299.421:58): pid=12252 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir013317093/syzkaller.HrHta8/62/file0/file0" dev="loop0" ino=23 res=1 20:34:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = inotify_init() r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = dup3(r0, r6, 0x0) ioctl$KVM_GET_DEBUGREGS(r5, 0x4080aea2, 0x0) dup2(r7, r5) 20:34:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:34:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) ioctl(r2, 0x800000000000937e, &(0x7f0000000080)="01000000000000001801") [ 363.706688][T12290] autofs4:pid:12290:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) [ 363.886426][ T26] audit: type=1804 audit(1583181300.041:59): pid=12277 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir013317093/syzkaller.HrHta8/63/file0/file0" dev="loop0" ino=24 res=1 20:35:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) unshare(0x400) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aea5, &(0x7f00000003c0)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54}}) 20:35:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) 20:35:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000000)='./file0\x00', 0x1070c5, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$FITRIM(r1, 0x40047211, &(0x7f0000000040)) 20:35:00 executing program 3: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ppoll(&(0x7f0000000140)=[{r2, 0x4001}], 0x1, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:35:00 executing program 2: syz_open_dev$media(0x0, 0xffffffffffffffff, 0x10080) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x42805) write$binfmt_misc(r0, &(0x7f0000000b00)=ANY=[@ANYBLOB="5300000044a6aeabec2e1520000000000000001000fff64017db9820000000003b08d403ffff633b27e59aa144175dd106736d17ff0300006e26560000000049d2e181baf9459c5c953948c6801d2c0945c08ba8c552fc99a7422007653872ecb4f63acdfe80812d274014ae40b8ae4f2a88d2fbea75e16a61fd063f026ed7360627ec60cb274e00da971f7ee096d74c92fad7e34bd5522d45cc36c2cb6222bc224609aba9e6000000000000000000000000000000f390d71cc6092cddd3b049f3fc65d61c2b3c65f2f80a61ea6e457ebc93981b20e03b86d4e999bbb53a7b0ee0ce30e80600cff8ca1496e518e3e69051f6d44317f9eb"], 0xf7) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x3dcf, 0x4000000000000800, 0x4}, 0x3c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000de3000)={{}, {0x1f}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x1ff) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x201, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) eventfd(0x8) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x490600, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(r6, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r7, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip_vti0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x84010}, 0x80) dup2(r5, r4) 20:35:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) unshare(0x400) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)) [ 364.366725][ C0] sd 0:0:1:0: [sg0] tag#8042 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 364.377612][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB: Test Unit Ready [ 364.384709][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.394759][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.404451][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.414199][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.424114][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.433728][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.443457][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.453418][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.464752][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.474895][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.486436][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.496273][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.504904][ T26] audit: type=1804 audit(1583181300.661:60): pid=12326 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir013317093/syzkaller.HrHta8/64/file0/file0" dev="sda1" ino=16684 res=1 [ 364.509776][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.549751][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.560597][ C0] sd 0:0:1:0: [sg0] tag#8042 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.584419][ T26] audit: type=1400 audit(1583181300.731:61): avc: denied { map_create } for pid=12309 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) unshare(0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 20:35:01 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) ppoll(&(0x7f00000000c0)=[{r2, 0x6641}, {r2, 0x403}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:35:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) [ 364.812520][ T26] audit: type=1400 audit(1583181300.971:62): avc: denied { prog_load } for pid=12309 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 364.897770][ C1] sd 0:0:1:0: [sg0] tag#8043 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 364.911410][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB: Test Unit Ready [ 364.917957][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.928018][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.937872][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.949318][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.959084][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.971240][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.980863][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 364.990706][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 365.000326][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 365.009960][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 365.019638][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 365.029258][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 365.038881][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20:35:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="600000000206e71800000000000000040000000014000780080012401d0000000800134000000000090002007379723100000000050001000700000011000300686173683a6e65742c6e65740000000005000400000000000500050002000000"], 0x60}}, 0x0) 20:35:01 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0xffffffffffffff43) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x521003, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) socket$inet(0x10, 0x3, 0x0) [ 365.048529][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 365.058393][ C1] sd 0:0:1:0: [sg0] tag#8043 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 20:35:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000100)={@local, @random, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @empty, {[@timestamp={0x44, 0x4, 0x6b}]}}, {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}, 0x0) 20:35:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) [ 365.301014][ T26] audit: type=1400 audit(1583181301.451:63): avc: denied { create } for pid=12351 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:35:01 executing program 5: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x4000e) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000380)=[{}], 0x17cc, 0x2d55) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:35:01 executing program 0: sendmmsg$unix(0xffffffffffffffff, &(0x7f00000096c0)=[{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000300)="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", 0x6cd}], 0x1}], 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x15}) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe06, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f00000000c0)=0x5, 0x4) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 20:35:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 365.406767][ T26] audit: type=1400 audit(1583181301.501:64): avc: denied { write } for pid=12351 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:35:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:01 executing program 3: syz_open_dev$media(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:35:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) unshare(0x400) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, 0x0) 20:35:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) unshare(0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x0, 0x0, 0x1]}) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) getpeername(0xffffffffffffffff, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) [ 374.011854][T12361] syz-executor.2 (12361) used greatest stack depth: 22648 bytes left 20:35:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) unshare(0x400) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, 0x0) 20:35:10 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7c, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) 20:35:10 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') read(r2, &(0x7f0000000380)=""/233, 0xffbe) 20:35:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) [ 374.838946][ T26] audit: type=1400 audit(1583181310.991:65): avc: denied { map_read map_write } for pid=12413 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 20:35:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f00000001c0)='0', 0x1}, {&(0x7f0000000140)='2', 0x1}], 0x2) 20:35:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7c, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) 20:35:11 executing program 2: socket(0x2b, 0x0, 0x0) bind$isdn(0xffffffffffffffff, &(0x7f0000000000), 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyS3\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 375.239478][T12424] syz-executor.1 (12424) used greatest stack depth: 22616 bytes left 20:35:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}], 0x28}}], 0x1, 0x0) 20:35:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 20:35:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f00000001c0)='0', 0x1}, {&(0x7f0000000140)='2', 0x1}], 0x2) 20:35:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x4}]}]}, 0x28}}, 0x0) 20:35:11 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}], 0x28}}], 0x1, 0x0) 20:35:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) setgid(0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 20:35:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) 20:35:12 executing program 5: 20:35:12 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote, r2}, 0x14) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}], 0x28}}], 0x1, 0x0) 20:35:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe}, 0x38) 20:35:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x100) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x102) pipe(0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)}], 0x1}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000280)={{0x2, 0x0, @identifier="50a3fd33e9fe375df438d6933267610c"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x1}, 0x0, 0x0, 0x3f, 0x2, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) statx(r3, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='fuseblk\x00', 0x2002, 0x0) quotactl(0xeda, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 20:35:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x641761b6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0x6, @random="ef7884fdf7fa"}) 20:35:12 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0x800000000000237, 0x1ffffffe) 20:35:12 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) ioctl$sock_netdev_private(r0, 0x8994, &(0x7f0000000780)) 20:35:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe}, 0x38) [ 376.434341][ T26] audit: type=1800 audit(1583181312.591:66): pid=12497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16524 res=0 20:35:12 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) [ 376.528066][ T26] audit: type=1804 audit(1583181312.641:67): pid=12497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir132818344/syzkaller.mJNSt5/63/file0/file0" dev="sda1" ino=16524 res=1 20:35:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=0x0], 0x14}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') socket(0x0, 0x0, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) 20:35:12 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 376.832318][ T26] audit: type=1804 audit(1583181312.981:68): pid=12497 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir132818344/syzkaller.mJNSt5/63/file0/file0" dev="sda1" ino=16524 res=1 20:35:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='L\x00\x00\x00\"\x00\'\r\x00'/20, @ANYRES32, @ANYBLOB="02000000000000000f00000009000100666c6f77000000001c000200100007000001000010000b80040002800800010010000000"], 0x4c}}, 0x0) [ 377.134355][T12516] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 20:35:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe}, 0x38) 20:35:13 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:13 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:35:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x30c5000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x282a8bc, &(0x7f0000000100)={[{@nogrpid='nogrpid'}]}) [ 377.421863][T11464] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 20:35:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC=0x0], 0x14}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') socket(0x0, 0x0, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x0) 20:35:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) [ 377.797564][T12546] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.850433][T12539] EXT4-fs (sda1): re-mounted. Opts: nogrpid, 20:35:14 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:14 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000540)=0x38) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000740)={0x4}) kcmp(r9, 0x0, 0x2, r7, r6) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r13, 0x4040aea0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r13, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x888884, &(0x7f0000000780)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYRESDEC, @ANYRESDEC=r10, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d", @ANYRESDEC=r13, @ANYBLOB="2c738d626a5f757365723d7b626465762c636d6163"]) setgid(0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, 0x0) 20:35:14 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sysinfo(&(0x7f0000000180)=""/192) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:35:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) [ 378.576389][T11464] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 379.159114][T12567] syz-executor.5: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz5,mems_allowed=0-1 [ 379.209306][T12567] CPU: 0 PID: 12567 Comm: syz-executor.5 Not tainted 5.6.0-rc3-syzkaller #0 [ 379.218151][T12567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.228320][T12567] Call Trace: [ 379.231730][T12567] dump_stack+0x197/0x210 [ 379.236147][T12567] warn_alloc.cold+0x87/0x164 [ 379.240970][T12567] ? zone_watermark_ok_safe+0x260/0x260 [ 379.246561][T12567] ? get_page_from_freelist+0x4330/0x4330 [ 379.252418][T12567] ? __isolate_free_page+0x4c0/0x4c0 [ 379.258367][T12567] ? mutex_unlock+0xd/0x10 [ 379.263207][T12567] ? drain_all_pages+0x440/0x5d0 [ 379.268192][T12567] __alloc_pages_slowpath+0x2362/0x2900 [ 379.273999][T12567] ? __alloc_pages_nodemask+0x53d/0x910 [ 379.279596][T12567] ? warn_alloc+0x110/0x110 [ 379.284236][T12567] ? __isolate_free_page+0x4c0/0x4c0 [ 379.291196][T12567] ? ___might_sleep+0x163/0x2c0 [ 379.296162][T12567] ? __kasan_check_read+0x11/0x20 [ 379.301326][T12567] __alloc_pages_nodemask+0x646/0x910 [ 379.306744][T12567] ? __alloc_pages_slowpath+0x2900/0x2900 [ 379.312606][T12567] ? __this_cpu_preempt_check+0x35/0x190 [ 379.318385][T12567] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.324643][T12567] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 379.331082][T12567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.337362][T12567] alloc_pages_current+0x107/0x210 [ 379.342624][T12567] ion_page_pool_alloc+0x18c/0x280 [ 379.347765][T12567] ion_system_heap_allocate+0x269/0xc20 [ 379.353506][T12567] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 379.359432][T12567] ? ion_system_heap_free+0x250/0x250 [ 379.364825][T12567] ? kfree+0x239/0x2c0 [ 379.369364][T12567] ion_ioctl+0x3ba/0xd20 [ 379.373700][T12567] ? _ion_buffer_destroy+0xb0/0xb0 [ 379.378977][T12567] ? selinux_file_mprotect+0x620/0x620 [ 379.384898][T12567] ? __fget_files+0x359/0x520 [ 379.389619][T12567] ? ksys_dup3+0x3e0/0x3e0 [ 379.394153][T12567] ? tomoyo_file_ioctl+0x23/0x30 [ 379.399111][T12567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.405459][T12567] ? security_file_ioctl+0x8d/0xc0 [ 379.410596][T12567] ? _ion_buffer_destroy+0xb0/0xb0 [ 379.415739][T12567] ksys_ioctl+0x123/0x180 [ 379.420093][T12567] __x64_sys_ioctl+0x73/0xb0 [ 379.424701][T12567] do_syscall_64+0xfa/0x790 [ 379.429227][T12567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.435152][T12567] RIP: 0033:0x45c479 [ 379.439409][T12567] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.459022][T12567] RSP: 002b:00007f9af2b35c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 379.467452][T12567] RAX: ffffffffffffffda RBX: 00007f9af2b366d4 RCX: 000000000045c479 [ 379.475445][T12567] RDX: 0000000020000000 RSI: 00000000c0184900 RDI: 0000000000000003 [ 379.484387][T12567] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 379.492480][T12567] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 379.500554][T12567] R13: 0000000000000365 R14: 00000000004c5962 R15: 000000000076bf2c [ 379.547966][T12567] Mem-Info: [ 379.573343][T12567] active_anon:186116 inactive_anon:244 isolated_anon:0 [ 379.573343][T12567] active_file:827 inactive_file:704 isolated_file:132 [ 379.573343][T12567] unevictable:0 dirty:11 writeback:1 unstable:0 [ 379.573343][T12567] slab_reclaimable:15125 slab_unreclaimable:101925 [ 379.573343][T12567] mapped:53489 shmem:321 pagetables:1182 bounce:0 [ 379.573343][T12567] free:25517 free_pcp:369 free_cma:0 [ 379.626850][T12567] Node 0 active_anon:744460kB inactive_anon:976kB active_file:2412kB inactive_file:2288kB unevictable:0kB isolated(anon):0kB isolated(file):216kB mapped:212856kB dirty:44kB writeback:4kB shmem:1284kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 379.655998][T12567] Node 0 DMA free:10332kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 379.940416][T12582] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 379.996098][T12567] lowmem_reserve[]: 0 2532 2532 2532 2532 [ 380.029057][T12582] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 380.061627][T12567] Node 0 DMA32 free:41628kB min:36068kB low:45084kB high:54100kB reserved_highatomic:4096KB active_anon:744384kB inactive_anon:896kB active_file:2316kB inactive_file:2308kB unevictable:0kB writepending:116kB present:3129332kB managed:2596440kB mlocked:0kB kernel_stack:8592kB pagetables:4644kB bounce:0kB free_pcp:380kB local_pcp:120kB free_cma:0kB 20:35:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) [ 380.112382][T12582] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 380.262130][T12582] EXT4-fs (loop2): orphan cleanup on readonly fs [ 380.296219][T12567] lowmem_reserve[]: 0 0 0 0 0 [ 380.301668][T12582] EXT4-fs error (device loop2): ext4_orphan_get:1256: comm syz-executor.2: bad orphan inode 105394176 [ 380.322032][T12567] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 380.334879][T12582] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 380.362999][T12567] lowmem_reserve[]: 0 0 0 0 0 [ 380.367751][T12567] Node 0 DMA: 1*4kB (U) 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10332kB [ 380.383365][T12567] Node 0 DMA32: 476*4kB (UME) 1091*8kB (UMH) 835*16kB (UME) 346*32kB (UME) 79*64kB (UME) 17*128kB (UME) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 42296kB [ 380.422318][T12567] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 380.438199][T12567] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 380.448052][T12567] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 380.458596][T12567] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 380.468629][T12567] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 380.481513][T12567] 1207 total pagecache pages [ 380.486642][T12567] 0 pages in swap cache [ 380.492174][T12567] Swap cache stats: add 0, delete 0, find 0/0 [ 380.499570][T12567] Free swap = 0kB [ 380.503377][T12567] Total swap = 0kB [ 380.507110][T12567] 1965979 pages RAM [ 380.510915][T12567] 0 pages HighMem/MovableOnly [ 380.515919][T12567] 345342 pages reserved [ 380.520847][T12567] 0 pages cma reserved 20:35:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000040)={0x3, @null}) 20:35:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:18 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000540)=0x38) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000740)={0x4}) kcmp(r9, 0x0, 0x2, r7, r6) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r13, 0x4040aea0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r13, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x888884, &(0x7f0000000780)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYRESDEC, @ANYRESDEC=r10, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d", @ANYRESDEC=r13, @ANYBLOB="2c738d626a5f757365723d7b626465762c636d6163"]) setgid(0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, 0x0) 20:35:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r0}, 0x38) 20:35:18 executing program 2: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000540)=0x38) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000740)={0x4}) kcmp(r9, 0x0, 0x2, r7, r6) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r13, 0x4040aea0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r13, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x888884, &(0x7f0000000780)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYRESDEC, @ANYRESDEC=r10, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d", @ANYRESDEC=r13, @ANYBLOB="2c738d626a5f757365723d7b626465762c636d6163"]) setgid(0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, 0x0) 20:35:18 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r0}, 0x38) 20:35:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 20:35:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:19 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r0}, 0x38) 20:35:19 executing program 2: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000540)=0x38) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000740)={0x4}) kcmp(r9, 0x0, 0x2, r7, r6) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r13, 0x4040aea0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r13, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x888884, &(0x7f0000000780)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYRESDEC, @ANYRESDEC=r10, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d", @ANYRESDEC=r13, @ANYBLOB="2c738d626a5f757365723d7b626465762c636d6163"]) setgid(0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, 0x0) 20:35:20 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc2604110, &(0x7f0000000040)={0x0, [[0x3d], [0xfffffd], [0x23]], [], [{0x0, 0x60}, {0x0, 0x9d1d}, {0x401, 0x0, 0x0, 0x1}], [], 0x400}) 20:35:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:20 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:20 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) [ 384.149946][T12649] syz-executor.1 (12649) used greatest stack depth: 22232 bytes left 20:35:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:20 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:20 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:21 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:21 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x30c5000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x282a8bc, &(0x7f0000000080)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3}}]}) 20:35:21 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:21 executing program 2: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000540)=0x38) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000740)={0x4}) kcmp(r9, 0x0, 0x2, r7, r6) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r13, 0x4040aea0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r13, 0xae80, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x888884, &(0x7f0000000780)=ANY=[@ANYRESDEC=r5, @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYRESDEC, @ANYRESDEC=r10, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d", @ANYRESDEC=r13, @ANYBLOB="2c738d626a5f757365723d7b626465762c636d6163"]) setgid(0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, 0x0) 20:35:21 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:21 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) [ 385.034371][T12677] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 20:35:21 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x30c5000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x282a8bc, &(0x7f0000000080)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3}}]}) 20:35:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:22 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc0984124, 0x0) 20:35:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r3}, 0x14) sendmmsg$inet6(r1, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}], 0x28}}], 0x1, 0x0) 20:35:22 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:22 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) [ 386.210312][T12701] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 20:35:22 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:22 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:22 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r0, 0xc0984124, &(0x7f0000000040)) 20:35:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x30c5000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x282a8bc, &(0x7f0000000080)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3}}]}) 20:35:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:23 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 387.315535][T12733] blkid (12733) used greatest stack depth: 22216 bytes left 20:35:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:25 executing program 2: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyS3\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}]}, 0x54}}, 0x0) 20:35:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:35:25 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) [ 389.228988][T12758] warn_alloc: 2 callbacks suppressed [ 389.229010][T12758] syz-executor.5: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz5,mems_allowed=0-1 [ 389.322404][T12758] CPU: 1 PID: 12758 Comm: syz-executor.5 Not tainted 5.6.0-rc3-syzkaller #0 [ 389.331221][T12758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.341285][T12758] Call Trace: [ 389.344622][T12758] dump_stack+0x197/0x210 [ 389.348999][T12758] warn_alloc.cold+0x87/0x164 [ 389.353693][T12758] ? zone_watermark_ok_safe+0x260/0x260 [ 389.359278][T12758] ? get_page_from_freelist+0x4330/0x4330 [ 389.365017][T12758] ? __isolate_free_page+0x4c0/0x4c0 [ 389.370334][T12758] ? drain_all_pages+0x4d/0x5d0 [ 389.375352][T12758] __alloc_pages_slowpath+0x2362/0x2900 [ 389.380949][T12758] ? __alloc_pages_nodemask+0x53d/0x910 [ 389.386525][T12758] ? warn_alloc+0x110/0x110 [ 389.391238][T12758] ? __isolate_free_page+0x4c0/0x4c0 [ 389.396539][T12758] ? ___might_sleep+0x163/0x2c0 [ 389.401410][T12758] ? __kasan_check_read+0x11/0x20 [ 389.406461][T12758] __alloc_pages_nodemask+0x646/0x910 [ 389.413018][T12758] ? __alloc_pages_slowpath+0x2900/0x2900 [ 389.418780][T12758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.425044][T12758] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 389.431470][T12758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.437731][T12758] alloc_pages_current+0x107/0x210 [ 389.442863][T12758] ion_page_pool_alloc+0x18c/0x280 [ 389.448438][T12758] ion_system_heap_allocate+0x269/0xc20 [ 389.453995][T12758] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 389.459813][T12758] ? ion_system_heap_free+0x250/0x250 [ 389.465278][T12758] ? ion_ioctl+0xa4e/0xd20 [ 389.470248][T12758] ion_ioctl+0x3ba/0xd20 [ 389.474506][T12758] ? _ion_buffer_destroy+0xb0/0xb0 [ 389.479649][T12758] ? selinux_file_mprotect+0x620/0x620 [ 389.485143][T12758] ? __fget_files+0x359/0x520 [ 389.489853][T12758] ? ksys_dup3+0x3e0/0x3e0 [ 389.494374][T12758] ? ns_to_kernel_old_timeval+0x100/0x100 [ 389.500119][T12758] ? tomoyo_file_ioctl+0x23/0x30 [ 389.505074][T12758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.511331][T12758] ? security_file_ioctl+0x8d/0xc0 [ 389.516546][T12758] ? _ion_buffer_destroy+0xb0/0xb0 [ 389.521663][T12758] ksys_ioctl+0x123/0x180 [ 389.525996][T12758] __x64_sys_ioctl+0x73/0xb0 [ 389.530575][T12758] do_syscall_64+0xfa/0x790 [ 389.535192][T12758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.541216][T12758] RIP: 0033:0x45c479 [ 389.545098][T12758] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.564773][T12758] RSP: 002b:00007f9af2b35c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 389.573182][T12758] RAX: ffffffffffffffda RBX: 00007f9af2b366d4 RCX: 000000000045c479 [ 389.581147][T12758] RDX: 0000000020000000 RSI: 00000000c0184900 RDI: 0000000000000003 [ 389.589251][T12758] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 389.597228][T12758] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 389.606326][T12758] R13: 0000000000000365 R14: 00000000004c5962 R15: 000000000076bf2c [ 389.618427][T12758] Mem-Info: 20:35:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 389.621818][T12758] active_anon:186135 inactive_anon:225 isolated_anon:0 [ 389.621818][T12758] active_file:1171 inactive_file:962 isolated_file:10 [ 389.621818][T12758] unevictable:0 dirty:47 writeback:0 unstable:0 [ 389.621818][T12758] slab_reclaimable:15404 slab_unreclaimable:101214 [ 389.621818][T12758] mapped:53753 shmem:301 pagetables:1143 bounce:0 [ 389.621818][T12758] free:26785 free_pcp:246 free_cma:0 [ 389.665744][T12758] Node 0 active_anon:744536kB inactive_anon:900kB active_file:4864kB inactive_file:3948kB unevictable:0kB isolated(anon):0kB isolated(file):40kB mapped:214912kB dirty:188kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 389.700484][T12758] Node 0 DMA free:10348kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 389.802365][T12758] lowmem_reserve[]: 0 2532 2532 2532 2532 [ 389.810094][T12758] Node 0 DMA32 free:39992kB min:38116kB low:47132kB high:56148kB reserved_highatomic:2048KB active_anon:744476kB inactive_anon:908kB active_file:4144kB inactive_file:4028kB unevictable:0kB writepending:284kB present:3129332kB managed:2596440kB mlocked:0kB kernel_stack:8488kB pagetables:4592kB bounce:0kB free_pcp:1352kB local_pcp:896kB free_cma:0kB [ 389.971501][T12758] lowmem_reserve[]: 0 0 0 0 0 [ 390.076319][T12758] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:35:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) [ 390.196422][T12758] lowmem_reserve[]: 0 0 0 0 0 [ 390.207563][T12758] Node 0 DMA: 1*4kB (U) 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10332kB [ 390.230317][T12758] Node 0 DMA32: 8*4kB (EH) 526*8kB (MH) 554*16kB (ME) 227*32kB (UMEH) 175*64kB (UMH) 87*128kB (UMEH) 9*256kB (UME) 2*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 46032kB [ 390.257910][T12758] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB 20:35:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:35:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyS3\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}]}, 0x54}}, 0x0) 20:35:26 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sysinfo(&(0x7f0000000180)=""/192) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 390.318478][T12758] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 390.408853][T12758] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 390.467982][T12758] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 20:35:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 390.532781][T12758] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 390.569896][T12758] 3453 total pagecache pages [ 390.590689][T12758] 0 pages in swap cache 20:35:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) [ 390.614291][T12758] Swap cache stats: add 0, delete 0, find 0/0 [ 390.621644][T12758] Free swap = 0kB [ 390.694538][T12758] Total swap = 0kB [ 390.698396][T12758] 1965979 pages RAM 20:35:26 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x10000, 0xfffffffffffffdee, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r8, 0x0, 0x8000, 0x2) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r8, &(0x7f0000000740)={0x4}) kcmp(r10, 0x0, 0x2, r8, r7) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e44f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07a33068d95e9bdca24b5e393f008ad4f052a2085085744186e34d5150b5b519a2e9d7663219eef5e5cf64f66493fba5e579a07ea9996f", @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYBLOB="2c67726f757036a7aeaab788765f69643d09e8af42572ee4da90cc24e3b7c33e23333d48d0a2ae02f75bba4b43c859cf76e963547629164f241bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d89799b8c8bb6e0daf931c7204e", @ANYRESDEC=r11, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) setgid(r11) statx(r8, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000140)='./bus\x00', r12, r11, 0x800) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r13) [ 390.702208][T12758] 0 pages HighMem/MovableOnly [ 390.747387][T12758] 345342 pages reserved [ 390.756184][T12788] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 390.822648][T12758] 0 pages cma reserved 20:35:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 390.885294][T12788] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 20:35:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:27 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) [ 391.045727][T12788] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock 20:35:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 20:35:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) [ 391.186289][T12788] EXT4-fs (loop2): orphan cleanup on readonly fs [ 391.282391][T12788] EXT4-fs error (device loop2): ext4_orphan_get:1256: comm syz-executor.2: bad orphan inode 107159552 [ 391.393631][T12788] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:35:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 20:35:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 20:35:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:28 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {}, {0x2}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x8}}]}}]}, 0x3c}}, 0x0) 20:35:28 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 20:35:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r1}, 0x38) 20:35:29 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x10000, 0xfffffffffffffdee, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r8, 0x0, 0x8000, 0x2) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r8, &(0x7f0000000740)={0x4}) kcmp(r10, 0x0, 0x2, r8, r7) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e44f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07a33068d95e9bdca24b5e393f008ad4f052a2085085744186e34d5150b5b519a2e9d7663219eef5e5cf64f66493fba5e579a07ea9996f", @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYBLOB="2c67726f757036a7aeaab788765f69643d09e8af42572ee4da90cc24e3b7c33e23333d48d0a2ae02f75bba4b43c859cf76e963547629164f241bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d89799b8c8bb6e0daf931c7204e", @ANYRESDEC=r11, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) setgid(r11) statx(r8, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000140)='./bus\x00', r12, r11, 0x800) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r13) 20:35:37 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffd65, 0x0, 0x0, 0xfffffffffffffe29) socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00002f2000/0x2000)=nil, 0x2000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:35:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:39 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:39 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x10000, 0xfffffffffffffdee, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r8, 0x0, 0x8000, 0x2) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r8, &(0x7f0000000740)={0x4}) kcmp(r10, 0x0, 0x2, r8, r7) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e44f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07a33068d95e9bdca24b5e393f008ad4f052a2085085744186e34d5150b5b519a2e9d7663219eef5e5cf64f66493fba5e579a07ea9996f", @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYBLOB="2c67726f757036a7aeaab788765f69643d09e8af42572ee4da90cc24e3b7c33e23333d48d0a2ae02f75bba4b43c859cf76e963547629164f241bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d89799b8c8bb6e0daf931c7204e", @ANYRESDEC=r11, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) setgid(r11) statx(r8, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000140)='./bus\x00', r12, r11, 0x800) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r13) 20:35:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:35:39 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', 0x0, 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000100000000000000000000000000000000000e00000004000000580200000000000000000000000000002c01000000000000c4010000c4010000c4010000c4010000c40100000400000000000000ac1e000100000000000000000000000076657468305f746f5f626f6e640000006772657461703000000000000000000000000000000000000000000000000000000000000000000000003f00000000000000000000000000700094000000000000000000000000000000004000000000240052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b0000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000e7ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000001000000000000000014000000000028005345540000000000000000000000000000000002000000000000000000010000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000be625cc919ed5292b9000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x3e) 20:35:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x20, 0x10, 0x581}, 0x20}}, 0x0) 20:35:40 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x0, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:40 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') 20:35:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x20, 0x10, 0x581}, 0x20}}, 0x0) 20:35:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x0, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) 20:35:41 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) 20:35:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:41 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000280)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2}, @timestamp={0x11, 0xff}}}}}, 0x0) 20:35:41 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x10000, 0xfffffffffffffdee, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r8, 0x0, 0x8000, 0x2) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r8, &(0x7f0000000740)={0x4}) kcmp(r10, 0x0, 0x2, r8, r7) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e44f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07a33068d95e9bdca24b5e393f008ad4f052a2085085744186e34d5150b5b519a2e9d7663219eef5e5cf64f66493fba5e579a07ea9996f", @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYBLOB="2c67726f757036a7aeaab788765f69643d09e8af42572ee4da90cc24e3b7c33e23333d48d0a2ae02f75bba4b43c859cf76e963547629164f241bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d89799b8c8bb6e0daf931c7204e", @ANYRESDEC=r11, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) setgid(r11) statx(r8, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000140)='./bus\x00', r12, r11, 0x800) r13 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r13) 20:35:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002540)=@newlink={0x20, 0x10, 0x581}, 0x20}}, 0x0) 20:35:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x1c, 0x8, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 20:35:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) [ 405.579981][T12946] warn_alloc: 1 callbacks suppressed [ 405.580002][T12946] syz-executor.5: page allocation failure: order:4, mode:0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), nodemask=0,cpuset=syz5,mems_allowed=0-1 [ 405.708789][T12946] CPU: 1 PID: 12946 Comm: syz-executor.5 Not tainted 5.6.0-rc3-syzkaller #0 [ 405.718939][T12946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.729158][T12946] Call Trace: [ 405.732691][T12946] dump_stack+0x197/0x210 [ 405.737035][T12946] warn_alloc.cold+0x87/0x164 [ 405.741899][T12946] ? zone_watermark_ok_safe+0x260/0x260 [ 405.747591][T12946] ? get_page_from_freelist+0x4330/0x4330 [ 405.753345][T12946] ? __isolate_free_page+0x4c0/0x4c0 [ 405.758838][T12946] ? drain_all_pages+0x4d/0x5d0 [ 405.763732][T12946] __alloc_pages_slowpath+0x2362/0x2900 [ 405.769327][T12946] ? __alloc_pages_nodemask+0x53d/0x910 [ 405.774912][T12946] ? warn_alloc+0x110/0x110 [ 405.779456][T12946] ? __isolate_free_page+0x4c0/0x4c0 [ 405.784853][T12946] ? ___might_sleep+0x163/0x2c0 [ 405.789737][T12946] ? __kasan_check_read+0x11/0x20 [ 405.794809][T12946] __alloc_pages_nodemask+0x646/0x910 [ 405.800653][T12946] ? __alloc_pages_slowpath+0x2900/0x2900 [ 405.806422][T12946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.812903][T12946] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 405.819331][T12946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.825597][T12946] alloc_pages_current+0x107/0x210 [ 405.830730][T12946] ion_page_pool_alloc+0x18c/0x280 [ 405.835848][T12946] ion_system_heap_allocate+0x269/0xc20 [ 405.841401][T12946] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 405.847291][T12946] ? ion_system_heap_free+0x250/0x250 [ 405.852673][T12946] ? ion_ioctl+0xa4e/0xd20 [ 405.857195][T12946] ion_ioctl+0x3ba/0xd20 [ 405.861449][T12946] ? _ion_buffer_destroy+0xb0/0xb0 [ 405.866961][T12946] ? selinux_file_mprotect+0x620/0x620 [ 405.872645][T12946] ? __fget_files+0x359/0x520 [ 405.877330][T12946] ? ksys_dup3+0x3e0/0x3e0 [ 405.881769][T12946] ? ns_to_kernel_old_timeval+0x100/0x100 [ 405.887490][T12946] ? tomoyo_file_ioctl+0x23/0x30 [ 405.892433][T12946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.898755][T12946] ? security_file_ioctl+0x8d/0xc0 [ 405.903977][T12946] ? _ion_buffer_destroy+0xb0/0xb0 [ 405.909209][T12946] ksys_ioctl+0x123/0x180 [ 405.913695][T12946] __x64_sys_ioctl+0x73/0xb0 [ 405.918382][T12946] do_syscall_64+0xfa/0x790 [ 405.923077][T12946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.929174][T12946] RIP: 0033:0x45c479 [ 405.933184][T12946] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.952965][T12946] RSP: 002b:00007f9af2b35c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.961477][T12946] RAX: ffffffffffffffda RBX: 00007f9af2b366d4 RCX: 000000000045c479 [ 405.969460][T12946] RDX: 0000000020000000 RSI: 00000000c0184900 RDI: 0000000000000003 [ 405.977658][T12946] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 405.985982][T12946] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 405.994237][T12946] R13: 0000000000000365 R14: 00000000004c5962 R15: 000000000076bf2c [ 406.008647][T12946] Mem-Info: [ 406.011831][T12946] active_anon:186678 inactive_anon:229 isolated_anon:0 [ 406.011831][T12946] active_file:883 inactive_file:873 isolated_file:0 [ 406.011831][T12946] unevictable:0 dirty:32 writeback:0 unstable:0 [ 406.011831][T12946] slab_reclaimable:14692 slab_unreclaimable:100740 [ 406.011831][T12946] mapped:53511 shmem:304 pagetables:1213 bounce:0 [ 406.011831][T12946] free:26176 free_pcp:241 free_cma:0 [ 406.052059][T12946] Node 0 active_anon:746756kB inactive_anon:916kB active_file:3488kB inactive_file:3612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:214156kB dirty:168kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 622592kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 406.302407][T12946] Node 0 DMA free:10332kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 20:35:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x0, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) [ 406.432311][T12946] lowmem_reserve[]: 0 2532 2532 2532 2532 [ 406.438129][T12946] Node 0 DMA32 free:37676kB min:36068kB low:45084kB high:54100kB reserved_highatomic:2048KB active_anon:746788kB inactive_anon:916kB active_file:4380kB inactive_file:5372kB unevictable:0kB writepending:20kB present:3129332kB managed:2596440kB mlocked:0kB kernel_stack:8660kB pagetables:4844kB bounce:0kB free_pcp:2052kB local_pcp:916kB free_cma:0kB 20:35:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) [ 406.703052][T12946] lowmem_reserve[]: 0 0 0 0 0 [ 406.735456][T12946] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 406.932384][T12946] lowmem_reserve[]: 0 0 0 0 0 [ 406.982373][T12946] Node 0 DMA: 1*4kB (U) 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10332kB 20:35:43 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='veth1_to_hsr\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000000)=[{{&(0x7f0000001480)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x1, 0x890) [ 407.019470][T12946] Node 0 DMA32: 546*4kB (UME) 300*8kB (UME) 143*16kB (UME) 194*32kB (UME) 17*64kB (UME) 57*128kB (UM) 7*256kB (UM) 12*512kB (M) 5*1024kB (UM) 2*2048kB (M) 0*4096kB = 38616kB [ 407.054482][T12946] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 407.148748][T12946] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 20:35:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x1, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:43 executing program 3: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r5) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x10000, 0xfffffffffffffdee, 0x0, 0x41100, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x78) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r8, 0x0, 0x8000, 0x2) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r9, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r8, &(0x7f0000000740)={0x4}) kcmp(r10, 0x0, 0x2, r8, r7) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e44f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07a33068d95e9bdca24b5e393f008ad4f052a2085085744186e34d5150b5b519a2e9d7663219eef5e5cf64f66493fba5e579a07ea9996f", @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYBLOB="2c67726f757036a7aeaab788765f69643d09e8af42572ee4da90cc24e3b7c33e23333d48d0a2ae02f75bba4b43c859cf76e963547629164f241bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d89799b8c8bb6e0daf931c7204e", @ANYRESDEC=r11, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB=',subj_user={bdev,smackfstransmute=/dev/kvm\x00,\x00']) setgid(r11) statx(r8, &(0x7f0000000300)='./bus\x00', 0x1000, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000140)='./bus\x00', r12, r11, 0x800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 407.202033][T12946] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:35:43 executing program 1: [ 407.242368][T12946] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 407.303876][T12946] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 20:35:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0xa, 0x0, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@remote, r4}, 0x14) sendmmsg$inet6(r2, &(0x7f0000000b40)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @remote, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}], 0x28}}], 0x1, 0x0) [ 407.352549][T12946] 3044 total pagecache pages [ 407.392506][T12946] 0 pages in swap cache [ 407.420037][T12946] Swap cache stats: add 0, delete 0, find 0/0 [ 407.453641][T12946] Free swap = 0kB [ 407.468876][T12946] Total swap = 0kB [ 407.489525][T12946] 1965979 pages RAM 20:35:43 executing program 1: [ 407.512045][T12946] 0 pages HighMem/MovableOnly [ 407.539409][T12946] 345342 pages reserved [ 407.568860][T12946] 0 pages cma reserved 20:35:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x0, 0x4, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0), &(0x7f00000012c0), 0xe, r2}, 0x38) 20:35:44 executing program 5: set_mempolicy(0x2, &(0x7f0000000080)=0xfffffffffffffffd, 0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x841) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x10010002, 0xfffffffffffffff7}) [ 408.503810][T13001] syz-executor.5 invoked oom-killer: gfp_mask=0x140dc2(GFP_HIGHUSER|__GFP_COMP|__GFP_ZERO), order=0, oom_score_adj=1000 [ 408.518613][T13001] CPU: 1 PID: 13001 Comm: syz-executor.5 Not tainted 5.6.0-rc3-syzkaller #0 [ 408.527297][T13001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.537475][T13001] Call Trace: [ 408.540773][T13001] dump_stack+0x197/0x210 [ 408.545208][T13001] dump_header+0x10b/0x82d [ 408.549750][T13001] oom_kill_process.cold+0x10/0x15 [ 408.554882][T13001] out_of_memory+0x334/0x13c0 [ 408.559627][T13001] ? lock_acquire+0x190/0x410 [ 408.564410][T13001] ? oom_killer_disable+0x280/0x280 [ 408.569628][T13001] ? mutex_trylock+0x252/0x2d0 [ 408.574403][T13001] ? __alloc_pages_slowpath+0xc9e/0x2900 [ 408.580061][T13001] __alloc_pages_slowpath+0x21fd/0x2900 [ 408.585649][T13001] ? warn_alloc+0x110/0x110 [ 408.590199][T13001] ? __kasan_check_read+0x11/0x20 [ 408.595231][T13001] __alloc_pages_nodemask+0x646/0x910 [ 408.600638][T13001] ? __alloc_pages_slowpath+0x2900/0x2900 [ 408.606373][T13001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.612961][T13001] ? cpuset_nodemask_valid_mems_allowed+0x63/0x90 [ 408.620074][T13001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.626848][T13001] alloc_pages_current+0x107/0x210 [ 408.632841][T13001] ion_page_pool_alloc+0x18c/0x280 [ 408.638051][T13001] ion_system_heap_allocate+0x269/0xc20 [ 408.643606][T13001] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 408.649801][T13001] ? ion_system_heap_free+0x250/0x250 [ 408.655188][T13001] ? ion_ioctl+0xa4e/0xd20 [ 408.659650][T13001] ion_ioctl+0x3ba/0xd20 [ 408.664454][T13001] ? _ion_buffer_destroy+0xb0/0xb0 [ 408.669619][T13001] ? selinux_file_mprotect+0x620/0x620 [ 408.675090][T13001] ? __fget_files+0x359/0x520 [ 408.679899][T13001] ? ksys_dup3+0x3e0/0x3e0 [ 408.684897][T13001] ? ns_to_kernel_old_timeval+0x100/0x100 [ 408.690678][T13001] ? tomoyo_file_ioctl+0x23/0x30 [ 408.695805][T13001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.702680][T13001] ? security_file_ioctl+0x8d/0xc0 [ 408.707932][T13001] ? _ion_buffer_destroy+0xb0/0xb0 [ 408.713053][T13001] ksys_ioctl+0x123/0x180 [ 408.720263][T13001] __x64_sys_ioctl+0x73/0xb0 [ 408.725005][T13001] do_syscall_64+0xfa/0x790 [ 408.729633][T13001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.735558][T13001] RIP: 0033:0x45c479 [ 408.739461][T13001] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.759540][T13001] RSP: 002b:00007f9af2b35c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.769012][T13001] RAX: ffffffffffffffda RBX: 00007f9af2b366d4 RCX: 000000000045c479 [ 408.776989][T13001] RDX: 0000000020000000 RSI: 00000000c0184900 RDI: 0000000000000003 [ 408.785386][T13001] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 408.794068][T13001] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 408.802051][T13001] R13: 0000000000000365 R14: 00000000004c5962 R15: 000000000076bf2c [ 408.832286][T13001] Mem-Info: [ 408.835493][T13001] active_anon:186635 inactive_anon:226 isolated_anon:0 [ 408.835493][T13001] active_file:145 inactive_file:97 isolated_file:0 [ 408.835493][T13001] unevictable:0 dirty:0 writeback:0 unstable:0 [ 408.835493][T13001] slab_reclaimable:14718 slab_unreclaimable:100442 [ 408.835493][T13001] mapped:52370 shmem:301 pagetables:1147 bounce:0 [ 408.835493][T13001] free:25276 free_pcp:2 free_cma:0 [ 408.992059][T13001] Node 0 active_anon:746536kB inactive_anon:904kB active_file:256kB inactive_file:424kB unevictable:0kB isolated(anon):0kB isolated(file):36kB mapped:209180kB dirty:0kB writeback:0kB shmem:1204kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 622592kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 409.057733][T13001] Node 0 DMA free:10332kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 409.098631][T13001] lowmem_reserve[]: 0 2532 2532 2532 2532 [ 409.106037][T13001] Node 0 DMA32 free:36224kB min:36068kB low:45084kB high:54100kB reserved_highatomic:2048KB active_anon:746536kB inactive_anon:904kB active_file:176kB inactive_file:360kB unevictable:0kB writepending:0kB present:3129332kB managed:2596440kB mlocked:0kB kernel_stack:8464kB pagetables:4584kB bounce:0kB free_pcp:420kB local_pcp:368kB free_cma:0kB [ 409.142553][T13001] lowmem_reserve[]: 0 0 0 0 0 [ 409.148346][T13001] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 409.185537][T13001] lowmem_reserve[]: 0 0 0 0 0 [ 409.190695][T13001] Node 0 DMA: 1*4kB (U) 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10332kB [ 409.205060][T13001] Node 0 DMA32: 746*4kB (UMEH) 537*8kB (ME) 232*16kB (ME) 55*32kB (ME) 32*64kB (ME) 23*128kB (M) 16*256kB (UM) 14*512kB (M) 5*1024kB (UM) 1*2048kB (M) 0*4096kB = 36176kB [ 409.247305][T13001] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 409.272337][T13001] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 409.281939][T13001] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 409.312309][T13001] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 409.321912][T13001] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 409.352882][T13001] 392 total pagecache pages [ 409.357441][T13001] 0 pages in swap cache [ 409.361681][T13001] Swap cache stats: add 0, delete 0, find 0/0 [ 409.368765][T13001] Free swap = 0kB [ 409.375582][T13001] Total swap = 0kB [ 409.379337][T13001] 1965979 pages RAM [ 409.386619][T13001] 0 pages HighMem/MovableOnly [ 409.391319][T13001] 345342 pages reserved [ 409.406708][T13001] 0 pages cma reserved [ 409.410822][T13001] oom-kill:constraint=CONSTRAINT_MEMORY_POLICY,nodemask=0,cpuset=syz5,mems_allowed=0-1,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=12953,uid=0 [ 409.429593][T13001] Out of memory: Killed process 12958 (syz-executor.2) total-vm:74968kB, anon-rss:2212kB, file-rss:34820kB, shmem-rss:0kB, UID:0 pgtables:132kB oom_score_adj:1000 [ 409.452833][ T487] oom_reaper: reaped process 12958 (syz-executor.2), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 416.874721][ T0] NOHZ: local_softirq_pending 08 [ 434.796224][ T0] NOHZ: local_softirq_pending 08 [ 435.433772][ T0] NOHZ: local_softirq_pending 08 [ 436.073775][ T0] NOHZ: local_softirq_pending 08 [ 496.874276][ T0] NOHZ: local_softirq_pending 08 [ 516.715834][ T0] NOHZ: local_softirq_pending 08 [ 519.914704][ T0] NOHZ: local_softirq_pending 08 [ 538.475330][ T0] NOHZ: local_softirq_pending 08 [ 539.753835][ T0] NOHZ: local_softirq_pending 08 [ 556.392464][ T485] INFO: task syz-executor.2:12974 blocked for more than 143 seconds. [ 556.400740][ T485] Not tainted 5.6.0-rc3-syzkaller #0 [ 556.416864][ T485] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 556.431664][ T485] syz-executor.2 D28128 12974 11080 0x00000004 [ 556.456596][ T485] Call Trace: [ 556.459990][ T485] __schedule+0x934/0x1f90 [ 556.470205][ T485] ? firmware_map_remove+0x1a3/0x1a3 [ 556.481187][ T485] ? lock_downgrade+0x920/0x920 [ 556.489400][ T485] ? rwlock_bug.part.0+0x90/0x90 [ 556.499777][ T485] schedule+0xdc/0x2b0 [ 556.507400][ T485] schedule_preempt_disabled+0x13/0x20 [ 556.518888][ T485] __mutex_lock+0x7ab/0x13c0 [ 556.527242][ T485] ? nfnetlink_rcv_msg+0x9ee/0xfb0 [ 556.539723][ T485] ? mutex_trylock+0x2d0/0x2d0 [ 556.548014][ T485] ? nla_memcpy+0xb0/0xb0 [ 556.568383][ T485] mutex_lock_nested+0x16/0x20 [ 556.584287][ T485] ? mutex_lock_nested+0x16/0x20 [ 556.591800][ T485] nfnetlink_rcv_msg+0x9ee/0xfb0 [ 556.601034][ T485] ? nfnetlink_bind+0x2c0/0x2c0 [ 556.611840][ T485] ? avc_has_extended_perms+0x10f0/0x10f0 [ 556.626862][ T485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.651711][ T485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.659759][ T485] ? cred_has_capability+0x199/0x320 [ 556.673482][ T485] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 556.682024][ T485] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 556.696649][ T485] ? __local_bh_enable_ip+0x15a/0x270 [ 556.710840][ T485] ? __check_heap_object+0x43/0xb3 [ 556.725509][ T485] netlink_rcv_skb+0x177/0x450 [ 556.738275][ T485] ? nfnetlink_bind+0x2c0/0x2c0 [ 556.750303][ T485] ? netlink_ack+0xb50/0xb50 [ 556.759499][ T485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.771741][ T485] ? ns_capable_common+0x93/0x100 [ 556.780865][ T485] ? ns_capable+0x20/0x30 [ 556.791300][ T485] ? __netlink_ns_capable+0x104/0x140 [ 556.807406][ T485] nfnetlink_rcv+0x1ba/0x460 [ 556.813409][ T485] ? nfnetlink_rcv_batch+0x1790/0x1790 [ 556.819335][ T485] ? netlink_deliver_tap+0x248/0xbf0 [ 556.825568][ T485] netlink_unicast+0x59e/0x7e0 [ 556.830996][ T485] ? netlink_attachskb+0x870/0x870 [ 556.837656][ T485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.845363][ T485] netlink_sendmsg+0x91c/0xea0 [ 556.850804][ T485] ? netlink_unicast+0x7e0/0x7e0 [ 556.857272][ T485] ? tomoyo_socket_sendmsg+0x26/0x30 [ 556.865188][ T485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.873079][ T485] ? security_socket_sendmsg+0x8d/0xc0 [ 556.879505][ T485] ? netlink_unicast+0x7e0/0x7e0 [ 556.885352][ T485] sock_sendmsg+0xd7/0x130 [ 556.890151][ T485] ____sys_sendmsg+0x753/0x880 [ 556.896217][ T485] ? kernel_sendmsg+0x50/0x50 [ 556.901325][ T485] ? __fget_files+0x337/0x520 [ 556.906709][ T485] ? find_held_lock+0x35/0x130 [ 556.912501][ T485] ___sys_sendmsg+0x100/0x170 [ 556.919203][ T485] ? sendmsg_copy_msghdr+0x70/0x70 [ 556.925392][ T485] ? __kasan_check_read+0x11/0x20 [ 556.931831][ T485] ? __fget_files+0x359/0x520 [ 556.937671][ T485] ? ksys_dup3+0x3e0/0x3e0 [ 556.942625][ T485] ? __fget_light+0x1ad/0x270 [ 556.947602][ T485] ? __fdget+0x1b/0x20 [ 556.952840][ T485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.960892][ T485] __sys_sendmsg+0x105/0x1d0 [ 556.967549][ T485] ? __sys_sendmsg_sock+0xc0/0xc0 [ 556.974633][ T485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 556.981228][ T485] ? do_syscall_64+0x26/0x790 [ 556.987078][ T485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.993812][ T485] ? do_syscall_64+0x26/0x790 [ 556.998876][ T485] __x64_sys_sendmsg+0x78/0xb0 [ 557.004862][ T485] do_syscall_64+0xfa/0x790 [ 557.009951][ T485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.016671][ T485] RIP: 0033:0x45c479 [ 557.021245][ T485] Code: Bad RIP value. [ 557.026092][ T485] RSP: 002b:00007f3c3b96dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 557.035773][ T485] RAX: ffffffffffffffda RBX: 00007f3c3b96e6d4 RCX: 000000000045c479 [ 557.044706][ T485] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 557.053631][ T485] RBP: 000000000076c060 R08: 0000000000000000 R09: 0000000000000000 [ 557.062232][ T485] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 557.071799][ T485] R13: 000000000000091f R14: 00000000004cb7c5 R15: 000000000076c06c [ 557.080766][ T485] [ 557.080766][ T485] Showing all locks held in the system: [ 557.090579][ T485] 1 lock held by khungtaskd/485: [ 557.098155][ T485] #0: ffffffff89bac340 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 557.108991][ T485] 2 locks held by rs:main Q:Reg/10902: [ 557.115300][ T485] #0: ffff8880a90b0120 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 557.124921][ T485] #1: ffff888214fbc428 (sb_writers#4){.+.+}, at: vfs_write+0x485/0x5d0 [ 557.135289][ T485] 1 lock held by rsyslogd/10905: [ 557.140770][ T485] #0: ffff888099c8d6a0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 557.150912][ T485] 2 locks held by getty/11026: [ 557.156380][ T485] #0: ffff8880a6a4e090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.166986][ T485] #1: ffffc900062d32e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.178592][ T485] 2 locks held by getty/11027: [ 557.184804][ T485] #0: ffff888091944090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.195537][ T485] #1: ffffc900062c32e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.205868][ T485] 2 locks held by getty/11028: [ 557.210915][ T485] #0: ffff8880922f4090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.220679][ T485] #1: ffffc900063532e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.232827][ T485] 2 locks held by getty/11029: [ 557.237801][ T485] #0: ffff8880921ea090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.248253][ T485] #1: ffffc900063432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.258768][ T485] 2 locks held by getty/11030: [ 557.264451][ T485] #0: ffff88809ada6090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.274376][ T485] #1: ffffc900063232e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.285345][ T485] 2 locks held by getty/11031: [ 557.290844][ T485] #0: ffff888095889090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.300928][ T485] #1: ffffc900063332e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.313135][ T485] 2 locks held by getty/11032: [ 557.318174][ T485] #0: ffff8880957ae090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 557.328067][ T485] #1: ffffc900062932e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 557.338342][ T485] 3 locks held by syz-executor.2/12958: [ 557.344883][ T485] 1 lock held by syz-executor.2/12974: [ 557.351222][ T485] #0: ffffffff8c3f1750 (&table[i].mutex){+.+.}, at: nfnetlink_rcv_msg+0x9ee/0xfb0 [ 557.361286][ T485] [ 557.365038][ T485] ============================================= [ 557.365038][ T485] [ 557.377779][ T485] NMI backtrace for cpu 1 [ 557.382332][ T485] CPU: 1 PID: 485 Comm: khungtaskd Not tainted 5.6.0-rc3-syzkaller #0 [ 557.390856][ T485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.401483][ T485] Call Trace: [ 557.404806][ T485] dump_stack+0x197/0x210 [ 557.409180][ T485] nmi_cpu_backtrace.cold+0x70/0xb2 [ 557.414563][ T485] ? vprintk_func+0x86/0x189 [ 557.419464][ T485] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 557.425500][ T485] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 557.431962][ T485] arch_trigger_cpumask_backtrace+0x14/0x20 [ 557.438466][ T485] watchdog+0xb11/0x10c0 [ 557.443802][ T485] kthread+0x361/0x430 [ 557.448111][ T485] ? reset_hung_task_detector+0x30/0x30 [ 557.454232][ T485] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 557.460169][ T485] ret_from_fork+0x24/0x30 [ 557.466070][ T485] Sending NMI from CPU 1 to CPUs 0: [ 557.473539][ C0] NMI backtrace for cpu 0 [ 557.473546][ C0] CPU: 0 PID: 12958 Comm: syz-executor.2 Not tainted 5.6.0-rc3-syzkaller #0 [ 557.473552][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.473556][ C0] RIP: 0010:match_held_lock+0xe/0x510 [ 557.473567][ C0] Code: ff ff 85 c0 78 02 c9 c3 89 c7 89 45 fc e8 8a e6 ff ff 8b 45 fc c9 c3 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 <41> 57 41 56 41 55 41 54 53 48 89 fb 48 83 c7 10 48 89 fa 48 83 ec [ 557.473570][ C0] RSP: 0018:ffffc900165feeb8 EFLAGS: 00000092 [ 557.473578][ C0] RAX: dffffc0000000000 RBX: 0000000000000003 RCX: ffffc900165fef70 [ 557.473583][ C0] RDX: 0000000000000003 RSI: ffffffff89bac340 RDI: ffff88803d010e68 [ 557.473587][ C0] RBP: ffffc900165feeb8 R08: 0000000000000003 R09: ffff88803d010e10 [ 557.473592][ C0] R10: fffffbfff154b698 R11: ffffffff8aa5b4c7 R12: ffff88803d010e68 [ 557.473597][ C0] R13: ffffffff869a361a R14: ffffffff89bac340 R15: 0000000000000002 [ 557.473602][ C0] FS: 00007f3c3b9b0700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 557.473606][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 557.473611][ C0] CR2: 00000000007ff000 CR3: 00000000a2246000 CR4: 00000000001406f0 [ 557.473616][ C0] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 557.473621][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 557.473623][ C0] Call Trace: [ 557.473626][ C0] find_held_lock+0x35/0x130 [ 557.473630][ C0] ? hash_netnet4_list+0x2ea/0x1400 [ 557.473633][ C0] lock_release+0x254/0x960 [ 557.473636][ C0] ? lock_downgrade+0x920/0x920 [ 557.473640][ C0] ? rcu_read_lock_held+0x9c/0xb0 [ 557.473643][ C0] ? __kasan_check_read+0x11/0x20 [ 557.473646][ C0] hash_netnet4_list+0x30c/0x1400 [ 557.473649][ C0] ? mark_held_locks+0xa4/0xf0 [ 557.473653][ C0] ? hash_netnet6_list+0x1380/0x1380 [ 557.473656][ C0] ? trace_hardirqs_on+0x67/0x240 [ 557.473659][ C0] ? hash_netnet4_uref+0x16a/0x260 [ 557.473663][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 557.473666][ C0] ip_set_dump_do+0xd5a/0x1b20 [ 557.473669][ C0] ? ip_set_rename+0x720/0x720 [ 557.473673][ C0] ? __kmalloc_reserve.isra.0+0xe0/0xf0 [ 557.473676][ C0] ? lock_downgrade+0x880/0x920 [ 557.473680][ C0] ? __kasan_check_write+0x14/0x20 [ 557.473683][ C0] netlink_dump+0x558/0xfb0 [ 557.473686][ C0] ? __netlink_sendskb+0xc0/0xc0 [ 557.473690][ C0] __netlink_dump_start+0x673/0x930 [ 557.473693][ C0] ? ip_set_nfnl_get_byindex+0x460/0x460 [ 557.473696][ C0] ip_set_dump+0x168/0x1f0 [ 557.473699][ C0] ? call_ad+0x5a0/0x5a0 [ 557.473703][ C0] ? ip_set_nfnl_get_byindex+0x460/0x460 [ 557.473706][ C0] ? ip_set_rename+0x720/0x720 [ 557.473710][ C0] ? __ip_set_put_netlink.isra.0+0x90/0x90 [ 557.473713][ C0] ? call_ad+0x5a0/0x5a0 [ 557.473716][ C0] nfnetlink_rcv_msg+0xcf2/0xfb0 [ 557.473720][ C0] ? nfnetlink_bind+0x2c0/0x2c0 [ 557.473723][ C0] ? avc_has_extended_perms+0x10f0/0x10f0 [ 557.473727][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.473731][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.473735][ C0] ? cred_has_capability+0x199/0x320 [ 557.473739][ C0] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 557.473742][ C0] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 557.473746][ C0] ? __local_bh_enable_ip+0x15a/0x270 [ 557.473749][ C0] ? __check_heap_object+0x43/0xb3 [ 557.473752][ C0] netlink_rcv_skb+0x177/0x450 [ 557.473756][ C0] ? nfnetlink_bind+0x2c0/0x2c0 [ 557.473759][ C0] ? netlink_ack+0xb50/0xb50 [ 557.473763][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.473766][ C0] ? ns_capable_common+0x93/0x100 [ 557.473769][ C0] ? ns_capable+0x20/0x30 [ 557.473773][ C0] ? __netlink_ns_capable+0x104/0x140 [ 557.473776][ C0] nfnetlink_rcv+0x1ba/0x460 [ 557.473779][ C0] ? nfnetlink_rcv_batch+0x1790/0x1790 [ 557.473782][ C0] ? netlink_deliver_tap+0x248/0xbf0 [ 557.473786][ C0] netlink_unicast+0x59e/0x7e0 [ 557.473789][ C0] ? netlink_attachskb+0x870/0x870 [ 557.473793][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.473796][ C0] netlink_sendmsg+0x91c/0xea0 [ 557.473799][ C0] ? netlink_unicast+0x7e0/0x7e0 [ 557.473803][ C0] ? tomoyo_socket_sendmsg+0x26/0x30 [ 557.473807][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.473810][ C0] ? security_socket_sendmsg+0x8d/0xc0 [ 557.473814][ C0] ? netlink_unicast+0x7e0/0x7e0 [ 557.473817][ C0] sock_sendmsg+0xd7/0x130 [ 557.473820][ C0] ____sys_sendmsg+0x753/0x880 [ 557.473823][ C0] ? kernel_sendmsg+0x50/0x50 [ 557.473826][ C0] ? __fget_files+0x337/0x520 [ 557.473829][ C0] ? find_held_lock+0x35/0x130 [ 557.473832][ C0] ___sys_sendmsg+0x100/0x170 [ 557.473835][ C0] ? sendmsg_copy_msghdr+0x70/0x70 [ 557.473839][ C0] ? __kasan_check_read+0x11/0x20 [ 557.473842][ C0] ? __fget_files+0x359/0x520 [ 557.473845][ C0] ? ksys_dup3+0x3e0/0x3e0 [ 557.473848][ C0] ? __fget_light+0x1ad/0x270 [ 557.473851][ C0] ? __fdget+0x1b/0x20 [ 557.473855][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.473858][ C0] __sys_sendmsg+0x105/0x1d0 [ 557.473861][ C0] ? __sys_sendmsg_sock+0xc0/0xc0 [ 557.473865][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 557.473869][ C0] ? do_syscall_64+0x26/0x790 [ 557.473873][ C0] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.473876][ C0] ? do_syscall_64+0x26/0x790 [ 557.473879][ C0] __x64_sys_sendmsg+0x78/0xb0 [ 557.473882][ C0] do_syscall_64+0xfa/0x790 [ 557.473886][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.473889][ C0] RIP: 0033:0x45c479 [ 557.473892][ C0] Code: Bad RIP value. [ 557.473895][ C0] RSP: 002b:00007f3c3b9afc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 557.473904][ C0] RAX: ffffffffffffffda RBX: 00007f3c3b9b06d4 RCX: 000000000045c479 [ 557.473909][ C0] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 557.473913][ C0] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 557.473918][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 557.473923][ C0] R13: 000000000000091f R14: 00000000004cb7c5 R15: 000000000076bf2c [ 557.473929][ C0] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 0.000 msecs [ 557.477115][ T485] Kernel panic - not syncing: hung_task: blocked tasks [ 558.118600][ T485] CPU: 1 PID: 485 Comm: khungtaskd Not tainted 5.6.0-rc3-syzkaller #0 [ 558.126898][ T485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.137513][ T485] Call Trace: [ 558.141017][ T485] dump_stack+0x197/0x210 [ 558.145452][ T485] panic+0x2e3/0x75c [ 558.149815][ T485] ? add_taint.cold+0x16/0x16 [ 558.154519][ T485] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 558.160429][ T485] ? ___preempt_schedule+0x16/0x18 [ 558.165586][ T485] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 558.171859][ T485] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 558.178344][ T485] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 558.184894][ T485] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 558.191223][ T485] watchdog+0xb22/0x10c0 [ 558.195703][ T485] kthread+0x361/0x430 [ 558.199982][ T485] ? reset_hung_task_detector+0x30/0x30 [ 558.205925][ T485] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 558.211846][ T485] ret_from_fork+0x24/0x30 [ 558.218468][ T485] Kernel Offset: disabled [ 558.223034][ T485] Rebooting in 86400 seconds..