[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.748643][ T26] audit: type=1800 audit(1570606026.694:25): pid=7087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.788581][ T26] audit: type=1800 audit(1570606026.704:26): pid=7087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.809937][ T26] audit: type=1800 audit(1570606026.704:27): pid=7087 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.106' (ECDSA) to the list of known hosts. 2019/10/09 07:27:18 fuzzer started 2019/10/09 07:27:20 dialing manager at 10.128.0.105:43333 2019/10/09 07:27:20 syscalls: 2523 2019/10/09 07:27:20 code coverage: enabled 2019/10/09 07:27:20 comparison tracing: enabled 2019/10/09 07:27:20 extra coverage: extra coverage is not supported by the kernel 2019/10/09 07:27:20 setuid sandbox: enabled 2019/10/09 07:27:20 namespace sandbox: enabled 2019/10/09 07:27:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/09 07:27:20 fault injection: enabled 2019/10/09 07:27:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/09 07:27:20 net packet injection: enabled 2019/10/09 07:27:20 net device setup: enabled 2019/10/09 07:27:20 concurrency sanitizer: enabled 07:27:22 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) syzkaller login: [ 51.310841][ T7258] IPVS: ftp: loaded support on port[0] = 21 07:27:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x7fffeffc) [ 51.402251][ T7258] chnl_net:caif_netlink_parms(): no params data found [ 51.449355][ T7258] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.466768][ T7258] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.485476][ T7258] device bridge_slave_0 entered promiscuous mode [ 51.510709][ T7258] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.517910][ T7258] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.527376][ T7258] device bridge_slave_1 entered promiscuous mode [ 51.551906][ T7258] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.562832][ T7258] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.608125][ T7258] team0: Port device team_slave_0 added [ 51.631238][ T7258] team0: Port device team_slave_1 added [ 51.702920][ T7258] device hsr_slave_0 entered promiscuous mode 07:27:22 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) [ 51.750142][ T7258] device hsr_slave_1 entered promiscuous mode [ 51.807834][ T7258] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.814966][ T7258] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.822445][ T7258] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.829620][ T7258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.889632][ T7261] IPVS: ftp: loaded support on port[0] = 21 [ 52.035340][ T7258] 8021q: adding VLAN 0 to HW filter on device bond0 07:27:23 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 52.089961][ T7258] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.097614][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.107073][ T7263] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.150174][ T7263] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.170610][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 52.249250][ T7264] IPVS: ftp: loaded support on port[0] = 21 [ 52.263534][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.280451][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.287581][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.310972][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.329923][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.337029][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.410363][ T7261] chnl_net:caif_netlink_parms(): no params data found [ 52.423265][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.433483][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.465114][ T7268] IPVS: ftp: loaded support on port[0] = 21 [ 52.473496][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.482882][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.497906][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.506937][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.517465][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.535020][ T7258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:27:23 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000}, 0xc, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x5, 0x37c, 0x38, 0x22, 0x7fff, 0x0, 0x20, 0x2, 0x0, 0x2, 0x6b}, [{0x4, 0x0, 0x0, 0x0, 0x2a60000, 0x0, 0x0, 0x891}], "519601a0e83a239bbf8b16c87d1905b77c216a7234f2100ab3ab13f04b5169019f7e093255616966cc342d8123a7eaf8b10567d691c0f8fb06a5b8a3f9a3458181d0718820d3d2ca8dbe5ba18c632406db5f043b681d9dc455d0b3bdbe50fb71cb0b1d23fb2ecbf57fed", [[]]}, 0x1c2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{}, {0x7fffffff}], 0xee01}, 0x18, 0x0) [ 52.615035][ T7258] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.636326][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.646417][ T7261] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.656781][ T7261] device bridge_slave_0 entered promiscuous mode [ 52.701894][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.709335][ T7261] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.732380][ T7261] device bridge_slave_1 entered promiscuous mode [ 52.840000][ T7261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.849225][ T7264] chnl_net:caif_netlink_parms(): no params data found [ 52.906008][ T7261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.945928][ T7268] chnl_net:caif_netlink_parms(): no params data found [ 52.997143][ T7261] team0: Port device team_slave_0 added [ 53.020595][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 53.020623][ T26] audit: type=1804 audit(1570606043.964:31): pid=7279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/0/bus" dev="sda1" ino=16519 res=1 [ 53.077129][ T7261] team0: Port device team_slave_1 added [ 53.100172][ T26] audit: type=1804 audit(1570606043.984:32): pid=7280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/0/bus" dev="sda1" ino=16519 res=1 07:27:24 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) 07:27:24 executing program 5: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 53.199205][ T7281] IPVS: ftp: loaded support on port[0] = 21 [ 53.214477][ T7268] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.224297][ T7268] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.237279][ T7268] device bridge_slave_0 entered promiscuous mode [ 53.246099][ T7264] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.253249][ T26] audit: type=1804 audit(1570606044.174:33): pid=7283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/1/bus" dev="sda1" ino=16519 res=1 07:27:24 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 53.306174][ T7264] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.315191][ T7264] device bridge_slave_0 entered promiscuous mode 07:27:24 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 53.361414][ T26] audit: type=1804 audit(1570606044.314:34): pid=7288 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/2/bus" dev="sda1" ino=16519 res=1 [ 53.393028][ T7261] device hsr_slave_0 entered promiscuous mode [ 53.430220][ T7261] device hsr_slave_1 entered promiscuous mode [ 53.479914][ T7261] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.492523][ T7268] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.501159][ T7268] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.509220][ T7268] device bridge_slave_1 entered promiscuous mode [ 53.523521][ T26] audit: type=1804 audit(1570606044.474:35): pid=7291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/3/bus" dev="sda1" ino=16519 res=1 [ 53.539130][ T7264] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.560108][ T7264] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.571787][ T7264] device bridge_slave_1 entered promiscuous mode 07:27:24 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 53.598194][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.605318][ T7261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.613301][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.620364][ T7261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.630913][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.640045][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.678843][ T7268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.719340][ T7292] IPVS: ftp: loaded support on port[0] = 21 [ 53.722713][ T7268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.731179][ T26] audit: type=1804 audit(1570606044.684:36): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/4/bus" dev="sda1" ino=16519 res=1 [ 53.756551][ T7261] 8021q: adding VLAN 0 to HW filter on device bond0 07:27:24 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 53.776963][ T7264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.795215][ T7261] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.820484][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.828721][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.839072][ T7264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.858971][ T7268] team0: Port device team_slave_0 added [ 53.866314][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.876270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.885381][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.892482][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 07:27:24 executing program 0: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 53.916675][ T26] audit: type=1804 audit(1570606044.864:37): pid=7299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/5/bus" dev="sda1" ino=16519 res=1 [ 53.952641][ T7268] team0: Port device team_slave_1 added [ 53.994186][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.010607][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.019229][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.020742][ T26] audit: type=1804 audit(1570606044.974:38): pid=7302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir470444510/syzkaller.CLF5dr/6/bus" dev="sda1" ino=16519 res=1 [ 54.026316][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.064510][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.074341][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.083645][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 07:27:25 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xf3eae937f6c46e7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000003, 0x12, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') fcntl$setstatus(r0, 0x4, 0x42000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=@broute={'\n\x00oute\x00', 0x20, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20d9f000], 0x0, 0x0, 0x0}, 0xa8) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10, {0x2, 0x4e22, @multicast1}, 'veth0_to_bridge\x00'}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgget(0x3, 0x0) chdir(&(0x7f0000000080)='./file1\x00') recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40002000, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed48000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a00"/539], 0x3}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)={r4, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) socket(0x10, 0x3, 0x0) [ 54.092472][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.101624][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.111276][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.122835][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.131678][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.157244][ T7261] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.168871][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.187102][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.195989][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.205127][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.221374][ T7264] team0: Port device team_slave_0 added [ 54.228351][ T7264] team0: Port device team_slave_1 added [ 54.238679][ C0] hrtimer: interrupt took 45335 ns [ 54.275908][ T7268] device hsr_slave_0 entered promiscuous mode [ 54.330373][ T7268] device hsr_slave_1 entered promiscuous mode [ 54.369880][ T7268] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.401335][ T7305] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.409261][ T7305] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.523145][ T7261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.597455][ T7264] device hsr_slave_0 entered promiscuous mode [ 54.640227][ T7264] device hsr_slave_1 entered promiscuous mode [ 54.690184][ T7264] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.717388][ T7281] chnl_net:caif_netlink_parms(): no params data found [ 54.907993][ T7268] 8021q: adding VLAN 0 to HW filter on device bond0 07:27:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x7fffeffc) [ 55.132541][ T7292] chnl_net:caif_netlink_parms(): no params data found [ 55.150358][ T7281] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.157468][ T7281] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.169521][ T7281] device bridge_slave_0 entered promiscuous mode [ 55.186470][ T7264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.196114][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.206876][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.216048][ T7268] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.235018][ T7281] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.243203][ T7281] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.254023][ T7281] device bridge_slave_1 entered promiscuous mode [ 55.327964][ T7281] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.338169][ T7292] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.346165][ T7292] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.354008][ T7292] device bridge_slave_0 entered promiscuous mode [ 55.363354][ T7281] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.387580][ T7281] team0: Port device team_slave_0 added [ 55.394892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.403974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.412859][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.420034][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.428576][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.437303][ T7292] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.444847][ T7292] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.452648][ T7292] device bridge_slave_1 entered promiscuous mode [ 55.474592][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.483150][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.492407][ T7281] team0: Port device team_slave_1 added [ 55.535519][ T7292] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.546182][ T7264] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.563896][ T7292] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.585501][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.594377][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.603721][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.610902][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.618711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.732971][ T7281] device hsr_slave_0 entered promiscuous mode [ 55.770540][ T7281] device hsr_slave_1 entered promiscuous mode [ 55.810011][ T7281] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.818847][ T7292] team0: Port device team_slave_0 added [ 55.828214][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.838241][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.846929][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.854194][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.862731][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.871956][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.880649][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.887785][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.895819][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.905330][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.914533][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.923577][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.934007][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.942845][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.952199][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.960835][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.969301][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.977835][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.986671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.996154][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.004672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.013848][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.065974][ T7292] team0: Port device team_slave_1 added [ 56.123325][ T7292] device hsr_slave_0 entered promiscuous mode [ 56.170388][ T7292] device hsr_slave_1 entered promiscuous mode [ 56.213878][ T7292] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.267326][ T7264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.281663][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.291260][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.301157][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.310337][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.319385][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.336004][ T7268] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.347392][ T7268] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.413690][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.422495][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.431885][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.440924][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.449687][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.559584][ T7281] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.573526][ T7292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.592387][ T2508] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 56.602376][ T7292] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.611729][ T7328] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 56.615476][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.619206][ T7328] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 56.635379][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.645014][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.653441][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.677167][ T2509] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 56.688621][ T7330] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 56.696333][ T7330] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 56.708521][ T7281] 8021q: adding VLAN 0 to HW filter on device team0 07:27:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xf3eae937f6c46e7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000003, 0x12, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') fcntl$setstatus(r0, 0x4, 0x42000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=@broute={'\n\x00oute\x00', 0x20, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20d9f000], 0x0, 0x0, 0x0}, 0xa8) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10, {0x2, 0x4e22, @multicast1}, 'veth0_to_bridge\x00'}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgget(0x3, 0x0) chdir(&(0x7f0000000080)='./file1\x00') recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40002000, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed48000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a00"/539], 0x3}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)={r4, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) socket(0x10, 0x3, 0x0) [ 56.728240][ T7268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.741286][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.755877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.791250][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.798339][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.831285][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.857262][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.866021][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.873372][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.881947][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.890815][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.899548][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.906647][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.915794][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.924150][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.933933][ T2504] device bridge_slave_1 left promiscuous mode [ 56.943564][ T2504] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.003111][ T2504] device bridge_slave_0 left promiscuous mode [ 57.009870][ T2504] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.790337][ T2504] device hsr_slave_0 left promiscuous mode [ 57.850107][ T2504] device hsr_slave_1 left promiscuous mode [ 57.919748][ T2504] team0 (unregistering): Port device team_slave_1 removed [ 57.949258][ T2504] team0 (unregistering): Port device team_slave_0 removed [ 57.961468][ T2504] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 58.014547][ T2504] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 58.104055][ T2504] bond0 (unregistering): Released all slaves [ 58.200970][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.210993][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.221236][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.234545][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.241837][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.250223][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.259711][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.269118][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.278101][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.286950][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.312144][ T7336] IPVS: ftp: loaded support on port[0] = 21 [ 58.319548][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.332571][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.341668][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.350631][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.359055][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.367672][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.378800][ T7292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.410300][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.419688][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.433516][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.446858][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.466368][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.480111][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.489142][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.498119][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.507063][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.516192][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.525903][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.642305][ T7292] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.659575][ T7281] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.918619][ T7336] chnl_net:caif_netlink_parms(): no params data found [ 59.043822][ T26] audit: type=1804 audit(1570606049.994:39): pid=7355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir117021724/syzkaller.N8eJKJ/0/bus" dev="sda1" ino=16545 res=1 [ 59.100652][ T7336] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.108139][ T7336] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.121832][ T7336] device bridge_slave_0 entered promiscuous mode [ 59.136197][ T7336] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.144300][ T7336] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.157227][ T7336] device bridge_slave_1 entered promiscuous mode [ 59.184359][ T26] audit: type=1800 audit(1570606050.134:40): pid=7358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16549 res=0 07:27:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 59.256723][ T7336] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.295162][ T7336] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:27:30 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) 07:27:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x7fffeffc) 07:27:30 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000}, 0xc, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x5, 0x37c, 0x38, 0x22, 0x7fff, 0x0, 0x20, 0x2, 0x0, 0x2, 0x6b}, [{0x4, 0x0, 0x0, 0x0, 0x2a60000, 0x0, 0x0, 0x891}], "519601a0e83a239bbf8b16c87d1905b77c216a7234f2100ab3ab13f04b5169019f7e093255616966cc342d8123a7eaf8b10567d691c0f8fb06a5b8a3f9a3458181d0718820d3d2ca8dbe5ba18c632406db5f043b681d9dc455d0b3bdbe50fb71cb0b1d23fb2ecbf57fed", [[]]}, 0x1c2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{}, {0x7fffffff}], 0xee01}, 0x18, 0x0) 07:27:30 executing program 5: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 59.399008][ T7336] team0: Port device team_slave_0 added [ 59.416211][ T26] audit: type=1804 audit(1570606050.364:41): pid=7365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir117021724/syzkaller.N8eJKJ/1/bus" dev="sda1" ino=16545 res=1 [ 59.434778][ T7336] team0: Port device team_slave_1 added 07:27:30 executing program 5: creat(&(0x7f0000000080)='./bus\x00', 0x0) setxattr$security_ima(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000d40)=ANY=[@ANYBLOB], 0x1, 0x0) open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) [ 59.533352][ T2508] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 59.560081][ T7369] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 59.567711][ T7369] squashfs: SQUASHFS error: unable to read squashfs_super_block 07:27:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x7fffeffc) [ 59.672933][ T7336] device hsr_slave_0 entered promiscuous mode [ 59.740563][ T7336] device hsr_slave_1 entered promiscuous mode [ 59.787265][ T26] audit: type=1804 audit(1570606050.734:42): pid=7376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir117021724/syzkaller.N8eJKJ/2/bus" dev="sda1" ino=16544 res=1 07:27:30 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) 07:27:31 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000}, 0xc, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x5, 0x37c, 0x38, 0x22, 0x7fff, 0x0, 0x20, 0x2, 0x0, 0x2, 0x6b}, [{0x4, 0x0, 0x0, 0x0, 0x2a60000, 0x0, 0x0, 0x891}], "519601a0e83a239bbf8b16c87d1905b77c216a7234f2100ab3ab13f04b5169019f7e093255616966cc342d8123a7eaf8b10567d691c0f8fb06a5b8a3f9a3458181d0718820d3d2ca8dbe5ba18c632406db5f043b681d9dc455d0b3bdbe50fb71cb0b1d23fb2ecbf57fed", [[]]}, 0x1c2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{}, {0x7fffffff}], 0xee01}, 0x18, 0x0) 07:27:31 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 60.137237][ T7336] 8021q: adding VLAN 0 to HW filter on device bond0 07:27:31 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 60.203276][ T2509] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 60.217907][ T7384] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 60.296701][ T7336] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.305013][ T7384] squashfs: SQUASHFS error: unable to read squashfs_super_block [ 60.355479][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.402941][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.490389][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.531059][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.547259][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.554401][ T7263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.635454][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.673533][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.726824][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.733994][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.796823][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.864058][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.881123][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.918564][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.956932][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.997690][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.035440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.075588][ T7336] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.098532][ T7336] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.130771][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.148542][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.195767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.238460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.272816][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.318424][ T7336] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.370519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.700041][ T7405] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.707775][ T7405] bridge0: port 1(bridge_slave_0) entered disabled state 07:27:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xf3eae937f6c46e7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000003, 0x12, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') fcntl$setstatus(r0, 0x4, 0x42000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=@broute={'\n\x00oute\x00', 0x20, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20d9f000], 0x0, 0x0, 0x0}, 0xa8) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10, {0x2, 0x4e22, @multicast1}, 'veth0_to_bridge\x00'}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgget(0x3, 0x0) chdir(&(0x7f0000000080)='./file1\x00') recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40002000, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed48000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a00"/539], 0x3}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)={r4, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) socket(0x10, 0x3, 0x0) 07:27:32 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000}, 0xc, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x5, 0x37c, 0x38, 0x22, 0x7fff, 0x0, 0x20, 0x2, 0x0, 0x2, 0x6b}, [{0x4, 0x0, 0x0, 0x0, 0x2a60000, 0x0, 0x0, 0x891}], "519601a0e83a239bbf8b16c87d1905b77c216a7234f2100ab3ab13f04b5169019f7e093255616966cc342d8123a7eaf8b10567d691c0f8fb06a5b8a3f9a3458181d0718820d3d2ca8dbe5ba18c632406db5f043b681d9dc455d0b3bdbe50fb71cb0b1d23fb2ecbf57fed", [[]]}, 0x1c2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{}, {0x7fffffff}], 0xee01}, 0x18, 0x0) 07:27:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:32 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='squashfs\x00', 0x0, 0x0) 07:27:32 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:32 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 62.033278][ T2508] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 62.055560][ T7410] SQUASHFS error: squashfs_read_data failed to read block 0x0 [ 62.086898][ T7410] squashfs: SQUASHFS error: unable to read squashfs_super_block 07:27:33 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 62.156300][ T26] audit: type=1800 audit(1570606053.104:43): pid=7415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=16571 res=0 07:27:33 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xf3eae937f6c46e7, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000003, 0x12, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') fcntl$setstatus(r0, 0x4, 0x42000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=@broute={'\n\x00oute\x00', 0x20, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20d9f000], 0x0, 0x0, 0x0}, 0xa8) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10, {0x2, 0x4e22, @multicast1}, 'veth0_to_bridge\x00'}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgget(0x3, 0x0) chdir(&(0x7f0000000080)='./file1\x00') recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40002000, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed48000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a00"/539], 0x3}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)={r4, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) socket(0x10, 0x3, 0x0) 07:27:34 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:34 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:34 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:34 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:35 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:36 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 07:27:36 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x8000}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000480)="0e0c0bdb6f27bf47597eeff581503fa0103eea98cef1eb94a8e85e02a7ee519695ed189d7d968ecf97b4b5d8476fff31a1d6fe24bf3968e29a9f7b7cd0fa964a3251bfac0d9e3a8c9e52920f210192ee048b6a6c3107354f1d5f49d9e56d94e0bbd5cab72c70064ef365967ea92c3c8c9e072edd5f87388b43acfd8f1a8180602c3bef27fe53d55e505d8ea893ae590eb352aeea4dde7cc152e97756678b1bbea7459d99a673f062c6ddf875e8c1d3109e8c47d4a990838134c134a263209fa21439fa660c82922771c564ae023fc13862609fde3940f9cd005784d23766770521", 0xe1) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0xc) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000740)) r7 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={r7, r4, 0x0, 0xffffffffffffffdc, &(0x7f0000000780)='f_\xd5\xab_2fs\x00'}, 0x19) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r8 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r8, 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 65.467349][ T7292] ================================================================== [ 65.478013][ T7292] BUG: KCSAN: data-race in __zone_watermark_ok / free_pcppages_bulk [ 65.485983][ T7292] [ 65.488306][ T7292] read to 0xffff88812fffce88 of 8 bytes by task 7440 on cpu 1: [ 65.495844][ T7292] __zone_watermark_ok+0x106/0x240 [ 65.501031][ T7292] get_page_from_freelist+0x629/0x2300 [ 65.506482][ T7292] __alloc_pages_nodemask+0x255/0x4d0 [ 65.512124][ T7292] cache_grow_begin+0x76/0x670 [ 65.516964][ T7292] kmem_cache_alloc_node_trace+0x580/0x670 [ 65.522761][ T7292] __kmalloc_node_track_caller+0x38/0x50 [ 65.528652][ T7292] __kmalloc_reserve.isra.0+0x49/0xd0 [ 65.534024][ T7292] __alloc_skb+0xc2/0x350 [ 65.538364][ T7292] skb_copy_expand+0x85/0x210 [ 65.543114][ T7292] sctp_ulpevent_make_send_failed+0x71/0x3e0 [ 65.549080][ T7292] sctp_datamsg_put+0x12e/0x300 [ 65.554027][ T7292] sctp_sendmsg_to_asoc+0xb7f/0x11c0 [ 65.559299][ T7292] sctp_sendmsg+0xc81/0x1090 [ 65.563879][ T7292] inet_sendmsg+0x6d/0x90 [ 65.568198][ T7292] [ 65.570526][ T7292] write to 0xffff88812fffce88 of 8 bytes by task 7292 on cpu 0: [ 65.578157][ T7292] free_pcppages_bulk+0x8e9/0xc10 [ 65.583187][ T7292] free_unref_page_commit+0x1e8/0x220 [ 65.588549][ T7292] free_unref_page_list+0x235/0x3a0 [ 65.593757][ T7292] release_pages+0x271/0xa90 [ 65.598352][ T7292] __pagevec_release+0x53/0x90 [ 65.603190][ T7292] truncate_inode_pages_range+0x774/0x1110 [ 65.608980][ T7292] truncate_inode_pages_final+0x64/0x90 [ 65.614526][ T7292] ext4_evict_inode+0x30c/0xdb0 [ 65.619362][ T7292] evict+0x244/0x410 [ 65.623329][ T7292] iput+0x362/0x4a0 [ 65.627121][ T7292] do_unlinkat+0x378/0x530 [ 65.631543][ T7292] __x64_sys_unlink+0x3b/0x50 [ 65.636218][ T7292] do_syscall_64+0xcf/0x2f0 [ 65.640697][ T7292] [ 65.643006][ T7292] Reported by Kernel Concurrency Sanitizer on: [ 65.649261][ T7292] CPU: 0 PID: 7292 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 65.656702][ T7292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.666834][ T7292] ================================================================== [ 65.675076][ T7292] Kernel panic - not syncing: panic_on_warn set ... [ 65.681684][ T7292] CPU: 0 PID: 7292 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 65.689121][ T7292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.699161][ T7292] Call Trace: [ 65.702447][ T7292] dump_stack+0xf5/0x159 [ 65.706685][ T7292] panic+0x209/0x639 [ 65.710595][ T7292] ? evict+0x244/0x410 [ 65.714663][ T7292] ? vprintk_func+0x8d/0x140 [ 65.719268][ T7292] kcsan_report.cold+0xc/0x1b [ 65.724033][ T7292] __kcsan_setup_watchpoint+0x3ee/0x510 [ 65.729574][ T7292] __tsan_write8+0x32/0x40 [ 65.733982][ T7292] free_pcppages_bulk+0x8e9/0xc10 [ 65.739035][ T7292] free_unref_page_commit+0x1e8/0x220 [ 65.744400][ T7292] free_unref_page_list+0x235/0x3a0 [ 65.749591][ T7292] release_pages+0x271/0xa90 [ 65.754205][ T7292] __pagevec_release+0x53/0x90 [ 65.759052][ T7292] truncate_inode_pages_range+0x774/0x1110 [ 65.764875][ T7292] ? __bpf_map_offload_destroy+0x10f/0x160 [ 65.770780][ T7292] truncate_inode_pages_final+0x64/0x90 [ 65.776334][ T7292] ext4_evict_inode+0x30c/0xdb0 [ 65.781188][ T7292] ? __kcsan_setup_watchpoint+0x96/0x510 [ 65.786805][ T7292] ? __tsan_read8+0x2c/0x30 [ 65.791319][ T7292] ? ext4_da_write_begin+0x7e0/0x7e0 [ 65.796603][ T7292] evict+0x244/0x410 [ 65.800500][ T7292] iput+0x362/0x4a0 [ 65.804305][ T7292] do_unlinkat+0x378/0x530 [ 65.808727][ T7292] __x64_sys_unlink+0x3b/0x50 [ 65.813408][ T7292] do_syscall_64+0xcf/0x2f0 [ 65.818098][ T7292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 65.823999][ T7292] RIP: 0033:0x4597a7 [ 65.827991][ T7292] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 65.847985][ T7292] RSP: 002b:00007ffeafcd3b58 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 65.856392][ T7292] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597a7 [ 65.864360][ T7292] RDX: 00007ffeafcd3b70 RSI: 00007ffeafcd3b70 RDI: 00007ffeafcd3c00 [ 65.872431][ T7292] RBP: 000000000000000c R08: 0000000000000000 R09: 0000000000000007 [ 65.880391][ T7292] R10: 0000000000000003 R11: 0000000000000246 R12: 00007ffeafcd4c90 [ 65.888348][ T7292] R13: 0000555555fab940 R14: 0000000000000000 R15: 00007ffeafcd4c90 [ 67.034097][ T7292] Shutting down cpus with NMI [ 67.040856][ T7292] Kernel Offset: disabled [ 67.045438][ T7292] Rebooting in 86400 seconds..