[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 46.268200][ T26] audit: type=1800 audit(1562886343.189:25): pid=8056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 46.288514][ T26] audit: type=1800 audit(1562886343.199:26): pid=8056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 46.331152][ T26] audit: type=1800 audit(1562886343.199:27): pid=8056 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.34' (ECDSA) to the list of known hosts. 2019/07/11 23:05:51 fuzzer started 2019/07/11 23:05:55 dialing manager at 10.128.0.26:34597 2019/07/11 23:05:55 syscalls: 2465 2019/07/11 23:05:55 code coverage: enabled 2019/07/11 23:05:55 comparison tracing: enabled 2019/07/11 23:05:55 extra coverage: extra coverage is not supported by the kernel 2019/07/11 23:05:55 setuid sandbox: enabled 2019/07/11 23:05:55 namespace sandbox: enabled 2019/07/11 23:05:55 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/11 23:05:55 fault injection: enabled 2019/07/11 23:05:55 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/11 23:05:55 net packet injection: enabled 2019/07/11 23:05:55 net device setup: enabled 23:06:24 executing program 0: syzkaller login: [ 87.818643][ T8223] IPVS: ftp: loaded support on port[0] = 21 23:06:24 executing program 1: [ 87.920775][ T8223] chnl_net:caif_netlink_parms(): no params data found [ 87.974575][ T8223] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.994183][ T8223] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.012437][ T8223] device bridge_slave_0 entered promiscuous mode [ 88.032368][ T8223] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.039492][ T8223] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.062329][ T8223] device bridge_slave_1 entered promiscuous mode [ 88.089746][ T8223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 88.111014][ T8226] IPVS: ftp: loaded support on port[0] = 21 [ 88.119049][ T8223] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:06:25 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xfffffffffffffcd2, 0x2751}, {&(0x7f0000001440)="1799b14c624f9dee74cd9d7465ccec90be0145e23c2687ec608a88e110de2d869b393d6b338aabe6bdd5a4b2d4027bae7e780fe64fde78706a6d515a2ddad7ce4dd1f78b27f835944f65ac3d45f26ede8be853db", 0x54, 0x3}]) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 88.160965][ T8223] team0: Port device team_slave_0 added [ 88.185399][ T8223] team0: Port device team_slave_1 added [ 88.265432][ T8223] device hsr_slave_0 entered promiscuous mode 23:06:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 88.322724][ T8223] device hsr_slave_1 entered promiscuous mode [ 88.418625][ T8228] IPVS: ftp: loaded support on port[0] = 21 [ 88.482813][ T8223] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.490010][ T8223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.497688][ T8223] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.504839][ T8223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.537349][ T8231] IPVS: ftp: loaded support on port[0] = 21 [ 88.558133][ T8226] chnl_net:caif_netlink_parms(): no params data found [ 88.653391][ T8223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.684696][ T8226] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.691939][ T8226] bridge0: port 1(bridge_slave_0) entered disabled state 23:06:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 88.700009][ T8226] device bridge_slave_0 entered promiscuous mode [ 88.709669][ T8226] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.718083][ T8226] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.727275][ T8226] device bridge_slave_1 entered promiscuous mode [ 88.769381][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.790329][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.812602][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.832327][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 88.860401][ T8223] 8021q: adding VLAN 0 to HW filter on device team0 23:06:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 88.955931][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.968405][ T8234] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.975530][ T8234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.985714][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.995255][ T8234] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.002404][ T8234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.024026][ T8226] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.056396][ T8236] IPVS: ftp: loaded support on port[0] = 21 [ 89.063443][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.074785][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.089779][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.099273][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.108988][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.117289][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.125630][ T3010] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.139421][ T8228] chnl_net:caif_netlink_parms(): no params data found [ 89.151664][ T8226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.178203][ T8238] IPVS: ftp: loaded support on port[0] = 21 [ 89.208317][ T8226] team0: Port device team_slave_0 added [ 89.217865][ T8226] team0: Port device team_slave_1 added [ 89.235631][ T8231] chnl_net:caif_netlink_parms(): no params data found [ 89.246088][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.254559][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.264616][ T8223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.344148][ T8226] device hsr_slave_0 entered promiscuous mode [ 89.391927][ T8226] device hsr_slave_1 entered promiscuous mode [ 89.489481][ T8228] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.496739][ T8228] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.504538][ T8228] device bridge_slave_0 entered promiscuous mode [ 89.512212][ T8228] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.519261][ T8228] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.527072][ T8228] device bridge_slave_1 entered promiscuous mode [ 89.547306][ T8231] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.554780][ T8231] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.562624][ T8231] device bridge_slave_0 entered promiscuous mode [ 89.570067][ T8231] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.577744][ T8231] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.585713][ T8231] device bridge_slave_1 entered promiscuous mode [ 89.608657][ T8231] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.634957][ T8231] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.657963][ T8228] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 89.680959][ T8228] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 89.704168][ T8228] team0: Port device team_slave_0 added [ 89.711337][ T8228] team0: Port device team_slave_1 added [ 89.718166][ T8231] team0: Port device team_slave_0 added [ 89.725421][ T8231] team0: Port device team_slave_1 added [ 89.733572][ T8223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.853186][ T8228] device hsr_slave_0 entered promiscuous mode [ 89.911688][ T8228] device hsr_slave_1 entered promiscuous mode [ 90.013083][ T8231] device hsr_slave_0 entered promiscuous mode [ 90.052416][ T8231] device hsr_slave_1 entered promiscuous mode [ 90.162436][ T8236] chnl_net:caif_netlink_parms(): no params data found [ 90.238472][ T8238] chnl_net:caif_netlink_parms(): no params data found 23:06:27 executing program 0: 23:06:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f00000002c0)={[], [{@subj_role={'subj_role'}}]}) [ 90.368947][ T8236] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.377597][ T8236] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.391117][ T8236] device bridge_slave_0 entered promiscuous mode [ 90.419776][ T8238] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.427016][ T8238] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.434626][ T8238] device bridge_slave_0 entered promiscuous mode [ 90.449637][ T8236] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.457721][ T8236] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.473745][ T8236] device bridge_slave_1 entered promiscuous mode [ 90.489909][ T8226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.497502][ T8238] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.505419][ T8238] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.514429][ T8238] device bridge_slave_1 entered promiscuous mode 23:06:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, 0x0, &(0x7f0000000100)) [ 90.580666][ T8236] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 90.623756][ T8228] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.635868][ T8231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.650966][ T8236] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 90.652563][ T8260] syz-executor.0 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 90.685824][ C0] hrtimer: interrupt took 31404 ns [ 90.696377][ T8238] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 90.716914][ T8226] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.725997][ T8236] team0: Port device team_slave_0 added 23:06:27 executing program 0: [ 90.733476][ T8238] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 90.752251][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.772741][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:06:27 executing program 0: 23:06:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop'}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='qnx6\x00', 0x0, 0x0) [ 90.780468][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.796228][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.810267][ T8231] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.844979][ T8236] team0: Port device team_slave_1 added [ 90.864216][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.873292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.882198][ T12] bridge0: port 1(bridge_slave_0) entered blocking state 23:06:27 executing program 0: chdir(0x0) symlink(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file1\x00') mount(0x0, &(0x7f0000000240)='./file1/file0\x00', 0x0, 0x0, 0x0) [ 90.889290][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.897352][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.905617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.926147][ T8228] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.963255][ T8238] team0: Port device team_slave_0 added [ 90.989014][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.999772][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.009099][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.018670][ T3770] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.025787][ T3770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.034402][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.043128][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.051931][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.060561][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.069056][ T3770] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.076132][ T3770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.144335][ T8236] device hsr_slave_0 entered promiscuous mode [ 91.201977][ T8236] device hsr_slave_1 entered promiscuous mode [ 91.242814][ T8238] team0: Port device team_slave_1 added [ 91.250715][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.259500][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.267902][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.276827][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.287482][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.295791][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.304244][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.312667][ T3770] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.319728][ T3770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.327284][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.336266][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.344550][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 91.352980][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.361218][ T3770] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.368298][ T3770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.381260][ T8226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.392660][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.419123][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.427487][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.437762][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.446297][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.454689][ T3770] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.461781][ T3770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.469617][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.478531][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.486755][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.495420][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.573368][ T8238] device hsr_slave_0 entered promiscuous mode [ 91.611925][ T8238] device hsr_slave_1 entered promiscuous mode [ 91.651771][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.660268][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.671624][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.679775][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.688837][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.697331][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.705891][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.747063][ T8226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.755087][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.764330][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.775304][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.783855][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.792679][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.801163][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.809476][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.818157][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.826860][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.835156][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.843659][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.852369][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.861003][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.871032][ T8228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.884717][ T8231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.926470][ T8228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.972463][ T8231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.023081][ T8236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.052128][ T8238] 8021q: adding VLAN 0 to HW filter on device bond0 23:06:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f00000000c0)={{}, {0x77359400}}, &(0x7f0000000100)) [ 92.080326][ T8236] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.090531][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.104256][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.123824][ T8238] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.157722][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.165835][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.174217][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.184736][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.195134][ T8234] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.202297][ T8234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.210110][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.219620][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.229318][ T8234] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.236389][ T8234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.244153][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.252903][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.263327][ T8234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.281909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.290496][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.308192][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.316433][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.336813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.346686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.355698][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.362806][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.424056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.443074][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.458079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.468484][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.487167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.496385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.511137][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.519904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.529140][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.537966][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.547109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.556022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.564961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.574072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.582997][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.592168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.600225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 92.615903][ T8238] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 92.628725][ T8299] loop2: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 92.629354][ T8238] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 92.649498][ T8236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.658940][ T8299] loop2: p1 start 1961794895 is beyond EOD, truncated [ 92.671967][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.671984][ T8299] loop2: p2 start 862666041 is beyond EOD, truncated [ 92.684706][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.686560][ T8299] loop2: p3 start 1305401306 is beyond EOD, truncated [ 92.701139][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.701876][ T8299] loop2: p4 start 4047113381 is beyond EOD, truncated [ 92.710350][ T3770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.716764][ T8299] loop2: p5 start 4148636738 is beyond EOD, truncated [ 92.731492][ T8299] loop2: p6 start 4107090354 is beyond EOD, truncated [ 92.738259][ T8299] loop2: p7 start 4013726589 is beyond EOD, truncated [ 92.740564][ T8238] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 92.745146][ T8299] loop2: p8 start 3952356567 is beyond EOD, truncated [ 92.758656][ T8299] loop2: p9 start 1748421572 is beyond EOD, truncated [ 92.758665][ T8299] loop2: p10 start 4003286882 is beyond EOD, truncated [ 92.758673][ T8299] loop2: p11 start 1799174555 is beyond EOD, truncated [ 92.758682][ T8299] loop2: p12 start 3470252589 is beyond EOD, truncated [ 92.799452][ T8240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.839902][ T8236] 8021q: adding VLAN 0 to HW filter on device batadv0 23:06:29 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xfffffffffffffcd2, 0x2751}, {&(0x7f0000001440)="1799b14c624f9dee74cd9d7465ccec90be0145e23c2687ec608a88e110de2d869b393d6b338aabe6bdd5a4b2d4027bae7e780fe64fde78706a6d515a2ddad7ce4dd1f78b27f835944f65ac3d45f26ede8be853db", 0x54, 0x3}]) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:06:29 executing program 0: 23:06:30 executing program 4: quotactl(0x40000080000104, 0x0, 0x0, 0x0) 23:06:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:06:30 executing program 1: syz_mount_image$hfsplus(&(0x7f0000001e80)='hfsplus\x00', &(0x7f0000001ec0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004000)={[{@session={'session'}}]}) 23:06:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:30 executing program 0: umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 23:06:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) [ 93.226132][ T8338] hfsplus: invalid session number or type of track 23:06:30 executing program 0: [ 93.272223][ T8338] hfsplus: unable to find HFS+ superblock 23:06:30 executing program 4: 23:06:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:06:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) [ 93.371848][ T8338] hfsplus: invalid session number or type of track [ 93.389619][ T8338] hfsplus: unable to find HFS+ superblock [ 93.587778][ T8321] loop2: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 93.595745][ T8321] loop2: p1 start 1961794895 is beyond EOD, truncated [ 93.603290][ T8321] loop2: p2 start 862666041 is beyond EOD, truncated [ 93.609968][ T8321] loop2: p3 start 1305401306 is beyond EOD, truncated [ 93.616989][ T8321] loop2: p4 start 4047113381 is beyond EOD, truncated [ 93.624378][ T8321] loop2: p5 start 4148636738 is beyond EOD, truncated [ 93.631222][ T8321] loop2: p6 start 4107090354 is beyond EOD, truncated [ 93.645557][ T8321] loop2: p7 start 4013726589 is beyond EOD, truncated [ 93.675929][ T8321] loop2: p8 start 3952356567 is beyond EOD, truncated [ 93.687909][ T8321] loop2: p9 start 1748421572 is beyond EOD, truncated [ 93.696339][ T8321] loop2: p10 start 4003286882 is beyond EOD, truncated [ 93.714385][ T8321] loop2: p11 start 1799174555 is beyond EOD, truncated [ 93.721280][ T8321] loop2: p12 start 3470252589 is beyond EOD, truncated 23:06:30 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xfffffffffffffcd2, 0x2751}, {&(0x7f0000001440)="1799b14c624f9dee74cd9d7465ccec90be0145e23c2687ec608a88e110de2d869b393d6b338aabe6bdd5a4b2d4027bae7e780fe64fde78706a6d515a2ddad7ce4dd1f78b27f835944f65ac3d45f26ede8be853db", 0x54, 0x3}]) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:06:30 executing program 0: 23:06:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:30 executing program 5: 23:06:30 executing program 1: 23:06:30 executing program 4: 23:06:30 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) 23:06:30 executing program 0: mkdir(&(0x7f00000007c0)='./file0\x00', 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)='./file1\x00') 23:06:30 executing program 5: mknod(&(0x7f0000000000)='./bus\x00', 0x80008002, 0x801) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 23:06:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:06:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:06:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 94.342348][ T8383] loop2: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 94.349885][ T8383] loop2: p1 start 1961794895 is beyond EOD, truncated [ 94.356754][ T8383] loop2: p2 start 862666041 is beyond EOD, truncated [ 94.363484][ T8383] loop2: p3 start 1305401306 is beyond EOD, truncated [ 94.370224][ T8383] loop2: p4 start 4047113381 is beyond EOD, truncated [ 94.378490][ T8383] loop2: p5 start 4148636738 is beyond EOD, truncated [ 94.385327][ T8383] loop2: p6 start 4107090354 is beyond EOD, truncated [ 94.392143][ T8383] loop2: p7 start 4013726589 is beyond EOD, truncated [ 94.398912][ T8383] loop2: p8 start 3952356567 is beyond EOD, truncated [ 94.405728][ T8383] loop2: p9 start 1748421572 is beyond EOD, truncated [ 94.412548][ T8383] loop2: p10 start 4003286882 is beyond EOD, truncated [ 94.419379][ T8383] loop2: p11 start 1799174555 is beyond EOD, truncated [ 94.426294][ T8383] loop2: p12 start 3470252589 is beyond EOD, truncated 23:06:31 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xfffffffffffffcd2, 0x2751}, {&(0x7f0000001440)="1799b14c624f9dee74cd9d7465ccec90be0145e23c2687ec608a88e110de2d869b393d6b338aabe6bdd5a4b2d4027bae7e780fe64fde78706a6d515a2ddad7ce4dd1f78b27f835944f65ac3d45f26ede8be853db", 0x54, 0x3}]) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:06:31 executing program 0: mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xffffffffffffffff) 23:06:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) 23:06:31 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) 23:06:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 23:06:31 executing program 1: 23:06:31 executing program 4: 23:06:31 executing program 5: 23:06:31 executing program 1: 23:06:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f00000002c0)=""/245, 0x0, 0xf5, 0x1}, 0x20) 23:06:31 executing program 0: mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xffffffffffffffff) 23:06:31 executing program 4: [ 94.982249][ T8420] loop2: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 94.990431][ T8420] loop2: p1 start 1961794895 is beyond EOD, truncated [ 94.997363][ T8420] loop2: p2 start 862666041 is beyond EOD, truncated [ 95.004141][ T8420] loop2: p3 start 1305401306 is beyond EOD, truncated [ 95.010883][ T8420] loop2: p4 start 4047113381 is beyond EOD, truncated [ 95.018215][ T8420] loop2: p5 start 4148636738 is beyond EOD, truncated [ 95.025661][ T8420] loop2: p6 start 4107090354 is beyond EOD, truncated [ 95.032484][ T8420] loop2: p7 start 4013726589 is beyond EOD, truncated [ 95.039238][ T8420] loop2: p8 start 3952356567 is beyond EOD, truncated [ 95.046049][ T8420] loop2: p9 start 1748421572 is beyond EOD, truncated [ 95.052904][ T8420] loop2: p10 start 4003286882 is beyond EOD, truncated [ 95.059851][ T8420] loop2: p11 start 1799174555 is beyond EOD, truncated [ 95.066757][ T8420] loop2: p12 start 3470252589 is beyond EOD, truncated 23:06:32 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xfffffffffffffcd2, 0x2751}, {&(0x7f0000001440)="1799b14c624f9dee74cd9d7465ccec90be0145e23c2687ec608a88e110de2d869b393d6b338aabe6bdd5a4b2d4027bae7e780fe64fde78706a6d515a2ddad7ce4dd1f78b27f835944f65ac3d45f26ede8be853db", 0x54, 0x3}]) 23:06:32 executing program 1: 23:06:32 executing program 0: mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xffffffffffffffff) 23:06:32 executing program 5: 23:06:32 executing program 4: 23:06:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f00000002c0)=""/245, 0x0, 0xf5, 0x1}, 0x20) 23:06:32 executing program 4: open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 23:06:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000800)='xfs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)={[{@grpquota='grpquota'}]}) 23:06:32 executing program 5: open(&(0x7f0000000000)='./file0/file0/file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000000c0)='@prockeyring\\\\cpuset#\x00') 23:06:32 executing program 0: mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xffffffffffffffff) 23:06:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, &(0x7f00000002c0)=""/245, 0x0, 0xf5, 0x1}, 0x20) 23:06:32 executing program 5: msgctl$IPC_STAT(0x0, 0x4, 0x0) [ 95.500046][ T8464] XFS (loop1): Invalid superblock magic number [ 95.646069][ T8460] loop2: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 95.654318][ T8460] loop2: p1 start 1961794895 is beyond EOD, truncated [ 95.661127][ T8460] loop2: p2 start 862666041 is beyond EOD, truncated [ 95.670565][ T8460] loop2: p3 start 1305401306 is beyond EOD, truncated [ 95.677998][ T8460] loop2: p4 start 4047113381 is beyond EOD, truncated [ 95.684845][ T8460] loop2: p5 start 4148636738 is beyond EOD, truncated [ 95.691667][ T8460] loop2: p6 start 4107090354 is beyond EOD, truncated [ 95.698425][ T8460] loop2: p7 start 4013726589 is beyond EOD, truncated [ 95.705227][ T8460] loop2: p8 start 3952356567 is beyond EOD, truncated [ 95.712026][ T8460] loop2: p9 start 1748421572 is beyond EOD, truncated [ 95.718776][ T8460] loop2: p10 start 4003286882 is beyond EOD, truncated [ 95.725691][ T8460] loop2: p11 start 1799174555 is beyond EOD, truncated [ 95.733105][ T8460] loop2: p12 start 3470252589 is beyond EOD, truncated 23:06:32 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 23:06:32 executing program 0: 23:06:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f00000002c0)=""/245, 0x26, 0xf5, 0x1}, 0x20) 23:06:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') 23:06:32 executing program 5: msgctl$IPC_STAT(0x0, 0x4, 0x0) 23:06:32 executing program 0: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000ec0)=""/4096) 23:06:32 executing program 5: msgctl$IPC_STAT(0x0, 0x4, 0x0) 23:06:33 executing program 1: 23:06:33 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) 23:06:33 executing program 5: msgctl$IPC_STAT(0x0, 0x4, 0x0) 23:06:33 executing program 4: 23:06:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f00000002c0)=""/245, 0x26, 0xf5, 0x1}, 0x20) 23:06:33 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 23:06:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000140)='./file0/file0\x00', 0x2, 0xea) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x800, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000e80)) epoll_wait(0xffffffffffffffff, &(0x7f00000000c0)=[{}], 0x1, 0x0) stat(0x0, &(0x7f0000001340)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000013c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x8001, 0x4e20, 0xffffffff, 0xa, 0x80, 0xa0, 0x3e}, {0x6, 0x7ff, 0x0, 0x0, 0x0, 0x1f, 0x3f, 0x9}, {0x81, 0x400, 0xffffffffffffff1f, 0x9}, 0x7, 0x6e6bbd, 0x1, 0x0, 0x2, 0x3}, {{@in=@multicast1, 0x4d3, 0x3f}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0xfffffffffffffffd, 0x10000}}, 0xe8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000200)={0x8000, 0x100000000, 0x1}) 23:06:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f00000002c0)=""/245, 0x26, 0xf5, 0x1}, 0x20) 23:06:33 executing program 0: prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0xffffffffffffff79) 23:06:33 executing program 4: msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 23:06:33 executing program 5: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 23:06:33 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 23:06:33 executing program 0: 23:06:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:33 executing program 5: 23:06:33 executing program 4: [ 96.446548][ T8543] FS-Cache: Duplicate cookie detected [ 96.452397][ T8543] FS-Cache: O-cookie c=00000000694df204 [p=0000000075459140 fl=222 nc=0 na=1] [ 96.461287][ T8543] FS-Cache: O-cookie d=00000000122a18ac n=00000000538076ee [ 96.468519][ T8543] FS-Cache: O-key=[10] '02000200000002000000' [ 96.474651][ T8543] FS-Cache: N-cookie c=0000000053b3a9f3 [p=0000000075459140 fl=2 nc=0 na=1] [ 96.483358][ T8543] FS-Cache: N-cookie d=00000000122a18ac n=000000008b932e51 [ 96.483376][ T8543] FS-Cache: N-key=[10] '02000200000002000000' 23:06:33 executing program 0: 23:06:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:33 executing program 1: 23:06:33 executing program 4: syz_open_procfs(0x0, 0xffffffffffffffff) 23:06:33 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xf7, 0x2751}]) 23:06:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 23:06:33 executing program 5: quotactl(0x40000080000100, 0x0, 0x0, 0x0) 23:06:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:33 executing program 0: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) 23:06:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x800020, 0x0) 23:06:33 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xf7, 0x2751}]) 23:06:33 executing program 1: 23:06:33 executing program 5: quotactl(0x40000080000100, 0x0, 0x0, 0x0) 23:06:33 executing program 0: 23:06:33 executing program 1: 23:06:34 executing program 5: 23:06:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:34 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x101, 0x7}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, 0x0, 0x9) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) setxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x2) syz_emit_ethernet(0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x0) capset(0x0, 0x0) 23:06:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) 23:06:34 executing program 0: 23:06:34 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xf7, 0x2751}]) 23:06:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:34 executing program 5: 23:06:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr={0x0, 0x0, 0x0, 0xa, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3}}]}}, &(0x7f00000002c0)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 23:06:34 executing program 0: 23:06:34 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x5, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_names\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={0xffffffffffffffff, 0xe, 0x1, 0xffff, &(0x7f0000000100)=[0x0], 0x1}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') epoll_create1(0x80000) pselect6(0x40, &(0x7f00000000c0)={0x9}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 23:06:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:06:34 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xf7, 0x2751}, {0x0, 0x0, 0x3}]) 23:06:34 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x101, 0x7}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, 0x0, 0x9) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) setxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x2) syz_emit_ethernet(0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x0) capset(0x0, 0x0) 23:06:34 executing program 0: accept4$unix(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 23:06:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}]}}, &(0x7f00000002c0)=""/245, 0x32, 0xf5, 0x1}, 0x20) 23:06:34 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x7ff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) quotactl(0x40000080000100, 0x0, 0x0, 0x0) 23:06:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x800, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000e80)) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000001340)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000013c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x8001, 0x4e20, 0xffffffff, 0xa, 0x80, 0xa0, 0x3e}, {0x6, 0x7ff, 0x0, 0x7, 0x0, 0x1f, 0x3f, 0x9}, {0x81, 0x400, 0x0, 0x9}, 0x7, 0x6e6bbd, 0x1, 0x0, 0x2, 0x3}, {{@in=@multicast1, 0x4d3, 0x3f}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0xfffffffffffffffd, 0x10000}}, 0xe8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000200)={0x8000, 0x100000000, 0x1}) 23:06:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x10000000000006) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="90e4e0dcd8b37ca6412f44e9c75d80fbdbbe013704663c1772ad6ce438193d944b03aea3efb2a47072315659ba0d7fb7622e06638aeed19dd94b085b019a26c87b18282aa4b383e30192b5c22b7c9cd62474e1b38598c2c0c08c4f133ebd9a754b2ebae1286d378f9dd011262d8e54652d48e0dd00661b6a16115952b16d2797818f748d5b7d23fd2d5ad8ef0bb5657e82cdb904ad540a3ea1bff8d8bc0e76080c24b27cb150f426ea2913b85d597772c58637e840a9548588df5448251401a5030500ff708b67ae32c3a7b69279d5f29d535142a812b07183df0487ebce59031e64762e14bce690642b32c155726604a50e0920e76085074f14", 0xfffffdf2, 0x7fffffff}], 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8004000000, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 97.765541][ T8661] kasan: CONFIG_KASAN_INLINE enabled [ 97.770961][ T8661] kasan: GPF could be caused by NULL-ptr deref or user memory access 23:06:34 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xf7, 0x2751}, {0x0, 0x0, 0x3}]) 23:06:34 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x101, 0x7}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, 0x0, 0x9) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) setxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x2) syz_emit_ethernet(0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x0) capset(0x0, 0x0) [ 97.851573][ T8661] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 97.852048][ T3890] kobject: 'loop2' (0000000032a5bb2d): kobject_uevent_env [ 97.858550][ T8661] CPU: 1 PID: 8661 Comm: syz-executor.3 Not tainted 5.2.0+ #23 [ 97.874345][ T8661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.884394][ T8661] RIP: 0010:btf_array_resolve+0x1b4/0x18f0 [ 97.890179][ T8661] Code: 00 00 00 00 00 fc ff df 42 80 3c 30 00 74 08 48 89 df e8 df 83 25 00 48 8b 03 48 89 44 24 70 48 8d 50 04 49 89 d7 49 c1 ef 03 <43> 8a 04 37 84 c0 48 89 54 24 30 0f 85 ec 10 00 00 44 8b 32 44 89 [ 97.909768][ T8661] RSP: 0018:ffff88806267f560 EFLAGS: 00010247 [ 97.915823][ T8661] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000040000 [ 97.923777][ T8661] RDX: 0000000000000004 RSI: 00000000000007d4 RDI: 00000000000007d5 [ 97.931734][ T8661] RBP: ffff88806267f690 R08: ffffffff818a06cd R09: ffffffff8189ae11 [ 97.939699][ T8661] R10: ffff88809549c300 R11: 0000000000000003 R12: 0000000000000002 [ 97.947678][ T8661] R13: 1ffff1101416bbd1 R14: dffffc0000000000 R15: 0000000000000000 [ 97.956151][ T8661] FS: 00007f58440b8700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 97.965061][ T8661] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 97.971638][ T8661] CR2: 0000000002423e80 CR3: 0000000095ace000 CR4: 00000000001406e0 [ 97.979591][ T8661] Call Trace: [ 97.982887][ T8661] ? __fs_reclaim_release+0x4/0x20 [ 97.987984][ T8661] ? btf_array_check_meta+0x2b0/0x2b0 [ 97.993342][ T8661] btf_resolve+0x3ed/0xda0 [ 97.997773][ T8661] ? btf_sec_info_cmp+0x110/0x110 [ 98.002777][ T8661] ? kasan_kmalloc+0x9/0x10 [ 98.007262][ T8661] ? __kmalloc_node+0x4d/0x60 [ 98.011923][ T8661] btf_new_fd+0x216a/0x37b0 [ 98.016516][ T8661] ? __might_fault+0xd2/0x160 [ 98.021189][ T8661] ? btf_release+0xd0/0xd0 [ 98.025594][ T8661] __do_sys_bpf+0x1212/0xc5d0 [ 98.030252][ T8661] ? tomoyo_file_ioctl+0x23/0x30 [ 98.035177][ T8661] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.041228][ T8661] ? __bfs+0x560/0x560 [ 98.045302][ T8661] ? __lock_acquire+0xc84/0x1ce0 [ 98.050230][ T8661] ? __bpf_prog_put_rcu+0x320/0x320 [ 98.055411][ T8661] ? __lock_acquire+0xc84/0x1ce0 [ 98.060340][ T8661] ? trace_lock_acquire+0x190/0x190 [ 98.065522][ T8661] ? __lock_acquire+0x1ce0/0x1ce0 [ 98.070524][ T8661] ? lock_acquire+0x158/0x250 [ 98.075186][ T8661] ? __might_fault+0xf9/0x160 [ 98.079853][ T8661] ? __lock_acquire+0x1ce0/0x1ce0 [ 98.084860][ T8661] ? lock_acquire+0x158/0x250 [ 98.089519][ T8661] ? __might_fault+0xd2/0x160 [ 98.094185][ T8661] ? kasan_check_read+0x11/0x20 [ 98.099016][ T8661] ? _copy_to_user+0xca/0xf0 [ 98.103589][ T8661] ? put_timespec64+0x106/0x150 [ 98.108422][ T8661] ? ktime_get_raw+0xf0/0xf0 [ 98.112994][ T8661] ? check_preemption_disabled+0xb7/0x2a0 [ 98.118698][ T8661] ? prepare_exit_to_usermode+0x1dd/0x560 [ 98.124398][ T8661] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 98.130015][ T8661] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 98.135459][ T8661] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 98.141171][ T8661] ? do_syscall_64+0x1d/0x140 [ 98.145831][ T8661] __x64_sys_bpf+0x7a/0x90 [ 98.150230][ T8661] do_syscall_64+0xfe/0x140 [ 98.154719][ T8661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 98.160595][ T8661] RIP: 0033:0x459819 [ 98.164475][ T8661] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 98.184066][ T8661] RSP: 002b:00007f58440b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.192466][ T8661] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 98.200420][ T8661] RDX: 0000000000000020 RSI: 00000000200000c0 RDI: 0000000000000012 [ 98.208373][ T8661] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 98.216325][ T8661] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58440b86d4 [ 98.224276][ T8661] R13: 00000000004bfa85 R14: 00000000004d1440 R15: 00000000ffffffff [ 98.232233][ T8661] Modules linked in: 23:06:35 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x101, 0x7}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, 0x0, 0x9) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x1d3, 0x0}, 0x0) setxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x2) syz_emit_ethernet(0x1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97003f8800fe800000000000000000000000000000ff02000000000000000000000000000100000000003f9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e5d4e5289686aef3d94aeb80f65735d9eca3b1c3b0ca3bd7b2b5a907e7d789ca771e92e4bbea99e96642686c24465aec2f82219062790b73194d5360f89f0ab67d0e6153988d49edeb53ca940e23036d80aa73d46d9afd19d254b818cc5b7caff84fb9c5e84e187ae7511950b591e790e88f65c44cbb8fc33165c3c2dbad13b6962e7fd7cab145d403956d5283bd0c92b5f0ca6c6184b65e6567ae5247566f63823849ea075f7eaf47c8642a5a7ff3d6992ef55ea93d781d76643e6c5825b8bbed478cdfca61b0"], 0x0) capset(0x0, 0x0) [ 98.264887][ T3890] kobject: 'loop2' (0000000032a5bb2d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 98.282507][ T8673] kobject: 'loop2' (0000000032a5bb2d): kobject_uevent_env [ 98.302339][ T8661] ---[ end trace b46c58d98f00e95b ]--- [ 98.307942][ T8661] RIP: 0010:btf_array_resolve+0x1b4/0x18f0 [ 98.313970][ T8673] kobject: 'loop2' (0000000032a5bb2d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 98.324776][ T8661] Code: 00 00 00 00 00 fc ff df 42 80 3c 30 00 74 08 48 89 df e8 df 83 25 00 48 8b 03 48 89 44 24 70 48 8d 50 04 49 89 d7 49 c1 ef 03 <43> 8a 04 37 84 c0 48 89 54 24 30 0f 85 ec 10 00 00 44 8b 32 44 89 [ 98.326138][ T3890] kobject: 'loop4' (00000000a0944b11): kobject_uevent_env [ 98.355293][ T8661] RSP: 0018:ffff88806267f560 EFLAGS: 00010247 [ 98.364511][ T8661] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000040000 [ 98.378413][ T8675] kobject: 'loop1' (00000000dca7eb74): kobject_uevent_env [ 98.385714][ T8675] kobject: 'loop1' (00000000dca7eb74): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 98.386437][ T3890] kobject: 'loop4' (00000000a0944b11): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 98.398709][ T8661] RDX: 0000000000000004 RSI: 00000000000007d4 RDI: 00000000000007d5 23:06:35 executing program 2: syz_read_part_table(0x0, 0x4, &(0x7f00000014c0)=[{&(0x7f0000001200)="5c96235838e269b199b24f727cad6a73161990158af30500c67a4bbe5fd88f6239b0f68aca4e6b6bef53d88a2c1bf7fdd2c8ab8e3550acba2985f67d90d60dd5c1d61f9ded17f50a1402ae0e7708afd777b8e1f1e7b3289ddbfcb5", 0x5b, 0x81}, {&(0x7f0000001280)="dc859047dfd922601449ed93bae49983f323ff4e8e13c2fd05c2d29267e3f4e82e14745d832fc22828ea40795ecffb446baf5eccc07dd06440008738d7e827c52514d3b734a1d0d88c183d777fd9deeffb5e9f3cd81edfc916f2d10f1f307358398bd0a55fa6ec14c082a43db21981d95d3c5b06dd1c24b393a51d4956cba1da23be9dac8c9e34f548d1d43845c5722adc5b76f8dae6d680a88952d7e20d28e3ed6cc1d6", 0xa4, 0x80}, {&(0x7f0000001340)="1aa3e5e455ada3dd2ad84a7af44148adf4bff93690067144ff2e4d06099601130a4376da84f24cb562edf6baebf65dba093b29389fa88344d45569f6e2e95c4a855206ea2aff52b48171f1773a003df2a73cb9ed270f8cf8a9400984a50c3af1353cd4d558f9b6b56a074846866e233a86fac7c55718d518422c47f75388a190a7dfb156c78cff9a95de7f76d3d6f72c39f7ec38b239cdf4c4a2f9d2cd7dbd7c2a304a77dc8c5b955599f11f205ecf107d9b3cef024e05760be061cb4902531617918cfad53e053b8a1e22d0d72c94eb33dadd28a4f8479a5b8184aa3e60736bbe0d7f2929f113a4c4cb36684a69ba73bd68f5cab41b2e", 0xf7, 0x2751}, {0x0, 0x0, 0x3}]) [ 98.447343][ T8661] RBP: ffff88806267f690 R08: ffffffff818a06cd R09: ffffffff8189ae11 [ 98.458195][ T8661] R10: ffff88809549c300 R11: 0000000000000003 R12: 0000000000000002 [ 98.467873][ T8661] R13: 1ffff1101416bbd1 R14: dffffc0000000000 R15: 0000000000000000 [ 98.478199][ T8661] FS: 00007f58440b8700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 98.492714][ T8678] kobject: 'loop2' (0000000032a5bb2d): kobject_uevent_env [ 98.499868][ T8678] kobject: 'loop2' (0000000032a5bb2d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 98.508759][ T3890] kobject: 'loop4' (00000000a0944b11): kobject_uevent_env [ 98.537516][ T3890] kobject: 'loop4' (00000000a0944b11): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 98.541586][ T8661] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 98.563934][ T3890] kobject: 'loop1' (00000000dca7eb74): kobject_uevent_env [ 98.576654][ T3890] kobject: 'loop1' (00000000dca7eb74): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:06:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x800, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000e80)) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000001340)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000013c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x8001, 0x4e20, 0xffffffff, 0xa, 0x80, 0xa0, 0x3e}, {0x6, 0x7ff, 0x0, 0x7, 0x0, 0x1f, 0x3f, 0x9}, {0x81, 0x400, 0x0, 0x9}, 0x7, 0x6e6bbd, 0x1, 0x0, 0x2, 0x3}, {{@in=@multicast1, 0x4d3, 0x3f}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x1, 0x0, 0x8, 0xfffffffffffffffd, 0x10000}}, 0xe8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000200)={0x8000, 0x100000000, 0x1}) [ 98.603469][ T8661] CR2: 0000000000738000 CR3: 0000000095ace000 CR4: 00000000001406e0 [ 98.621176][ T8661] Kernel panic - not syncing: Fatal exception [ 98.628194][ T8661] Kernel Offset: disabled [ 98.632511][ T8661] Rebooting in 86400 seconds..