r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:11 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) [ 464.142589][T16368] ttyS3: LSR safety check engaged! [ 464.219798][T16368] ttyS3: LSR safety check engaged! 06:00:12 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:12 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0x20004, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000140)={0xa, @pix={0x0, 0x0, 0x0, 0x6}}) socket$unix(0x1, 0x0, 0x0) 06:00:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/41, 0x29}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) recvmsg(r6, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 06:00:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000240)={0x28, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 464.525504][T16394] ttyS3: LSR safety check engaged! 06:00:12 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) accept(0xffffffffffffffff, &(0x7f0000000240)=@l2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)) syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@ssrr={0x89, 0x3, 0x7f}, @rr={0x7, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @empty}}}}}, 0x0) [ 464.546375][T16394] ttyS3: LSR safety check engaged! 06:00:12 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802103001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40000000000006) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x3fc, 0x0, 0x48}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 06:00:12 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0x20004, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) poll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x0) 06:00:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_MTU={0x8}]}, 0x28}}, 0x0) 06:00:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") syz_emit_ethernet(0x3d, &(0x7f0000000640)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x2, 0x2f, 0x0, @remote, @ipv4={[], [], @local}, {[], @udp={0x2c00, 0x0, 0x8}}}}}}, 0x0) 06:00:14 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r0, &(0x7f0000001640)=[{&(0x7f0000000040)="8021fedea800"/21, 0xfca2}], 0x1) 06:00:14 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$rfkill(r2, &(0x7f0000000000), 0x7826) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(r3, 0x8910, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x20000) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe38) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000280)=""/61) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0xa2800) 06:00:14 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 06:00:14 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:14 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x8b, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x13}, 0x1c) 06:00:14 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:14 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x20007, [{0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000300)=""/250, 0x3a, 0xfa, 0x8}, 0x20) 06:00:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet(0x2, 0x3, 0x2) sendmmsg(r1, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x2b5, &(0x7f0000000480)}}], 0x2, 0x0) dup(0xffffffffffffffff) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) creat(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) 06:00:15 executing program 0: r0 = socket$inet(0x2, 0x3, 0x86) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge_slave_1\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000501}, 0x10) 06:00:15 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$rfkill(r2, &(0x7f0000000000), 0x7826) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(r3, 0x8910, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x20000) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe38) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup3(r6, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000280)=""/61) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0xa2800) 06:00:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) msgctl$IPC_INFO(0x0, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005b9) shutdown(r0, 0x0) 06:00:15 executing program 0: 06:00:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) 06:00:17 executing program 4: 06:00:17 executing program 0: 06:00:17 executing program 1: 06:00:17 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:17 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, 0x0, 0x0) 06:00:18 executing program 4: 06:00:18 executing program 1: 06:00:18 executing program 3: 06:00:18 executing program 1: 06:00:18 executing program 4: 06:00:18 executing program 0: 06:00:18 executing program 1: 06:00:18 executing program 4: 06:00:18 executing program 0: 06:00:18 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:18 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:18 executing program 3: 06:00:18 executing program 1: 06:00:18 executing program 0: 06:00:18 executing program 4: 06:00:18 executing program 1: 06:00:18 executing program 4: 06:00:18 executing program 0: 06:00:19 executing program 3: 06:00:19 executing program 4: 06:00:19 executing program 1: 06:00:19 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:19 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:19 executing program 0: 06:00:19 executing program 3: 06:00:19 executing program 1: 06:00:19 executing program 4: 06:00:19 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:19 executing program 0: 06:00:19 executing program 4: getresgid(0x0, 0x0, 0x0) pipe2(0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, &(0x7f0000000080)) gettid() 06:00:19 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)) 06:00:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r1, r0) 06:00:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:20 executing program 4: getresgid(0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4100, 0x0) write$P9_RSTATu(r0, 0x0, 0x0) syncfs(r0) 06:00:20 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) 06:00:20 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802103001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40000000000006) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x5, 0x0, 0x48}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 06:00:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, 0x0, 0xd000000) 06:00:20 executing program 4: bpf$PROG_LOAD(0x3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:00:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) open$dir(0x0, 0x80000, 0x0) 06:00:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000140), 0x0) 06:00:21 executing program 1: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20840, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000002c0)={{0xa, 0x4e23, 0x7c48, @mcast2, 0x20}, {0xa, 0x4e21, 0x4, @remote, 0x7417}, 0x1, [0x47, 0x5, 0xffff, 0x6, 0x7, 0xfff, 0x40, 0x2]}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000004c0)=[@timestamp, @timestamp, @timestamp, @mss={0x2, 0x1}, @sack_perm, @sack_perm], 0x6) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000680)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000006c0)) openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0x4200, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000980)=0x1, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000009c0)='}eth1vmnet0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000d00)='net/ip6_flowlabel\x00') getsockname$netlink(r2, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) 06:00:21 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)=""/80, 0x0) 06:00:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x68, &(0x7f0000000100)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast}, @gre={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x6]}}}}}}, 0x0) 06:00:21 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:21 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x7, &(0x7f0000001300), &(0x7f0000000100)=0xfebe) 06:00:21 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x8012, r0, 0x0) 06:00:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r2, 0x0, r4, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r3, 0x407, 0x8000000) 06:00:21 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:00:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r1, 0x407, 0x0) 06:00:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @dev}, 0xc) 06:00:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 06:00:22 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:22 executing program 0: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 06:00:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x4d) syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) open(0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x24, r5, 0x30, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1f}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000007d036f7ff837fe41408bb4af9ffbcf01de4eef61e7a83d4c77a2f2c549e73b8177288b9ae5c7f245b20701a76c62868be678a06756eeec0a4c77", @ANYRES16=r3, @ANYBLOB="3c0428bd7000fedbdf250000014100000018001700000004000000ff7564703a73797a300000000023d92a3dac635602bbdbd1f0a61e301f8803000000000000bfff8199c1c39553977cd769bce570e94622f32c9762e7c73ae2bc223e8db10c7f6895132eee56e69cbda18511b779adf95b0ee65d76db7da96647f58be1f4b5b7342d409376865487b3dff30ad055b34581aa1c24333986117a5d8923107034843b2e"], 0x34}, 0x1, 0x0, 0x0, 0x2004000}, 0x14008004) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, 0x0) fcntl$getflags(r2, 0x401) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r6, &(0x7f0000000240)=""/202, 0xca) sendmsg$nl_netfilter(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x24, 0x1, 0x1, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x15, @u32}, @nested={0x8, 0x8}]}, 0x24}}, 0x0) 06:00:22 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="a9", 0x1}], 0x1) 06:00:22 executing program 4: add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)='\x00', 0x1, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 06:00:22 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="0213000002000000000000000000006ee9b678a1b4acd01c5862332213d41811a4083da93eafd9f92b633eca19016cd4b878f2a4c21c363ca1e96cf95a74f66d61550c7f599bb4605c27fdcc8d07f6c3f7f64c805f082d8ad14d8a408c9904ebe2acd49f7cf1bb3edd2822e5309564031a24ca70f1cbd450c73995831e010d0414bbca"], 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 06:00:22 executing program 4: getpid() r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8}]]}}}]}, 0x38}}, 0x0) 06:00:22 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_opts(r0, 0x0, 0x15, &(0x7f0000000000), 0x4) [ 475.216819][T16741] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:00:22 executing program 3: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x53d0eb10) 06:00:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@filter={'filter\x00\x00\x00\x00\x00\x04\x00l\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000c70b00000000e4ff00000000000000000000000000000000000000000000ffffffff0100000005000000200000000000697036677265300000000000400000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa00006e0000000024ffffffffff0000000000000000f0000000f0000000200100006c6979697400000000000000000000000000000000000000000000000000000020000000000000000000003f82fa45000000000000000000000000f8ffffffffffffff0000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000100000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004001000000feffffff010000001100000000000000002f7eb54a6e3000000000000000000000006c6f00000000812d92138c2d5097000044fc736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) 06:00:22 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 475.270554][T16744] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 06:00:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x0, &(0x7f0000001000)={0x77359400}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102000000000040000000000079a40ae3708d2386e520ac24034d3c87b269add72a5f74fb6f8171cfa0e671a0ef84e88418a441c878fd54db6125ea07714ef8bec0ccce9e7e6032decd1cdbd76ecbcd81c0da59323c3ccccce33478c34da8b720503ff0a4c59498a3fdc5c6af4caf73ce7928b6"], 0x10}}, 0x0) 06:00:23 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x27, 0x0, &(0x7f0000000040)) 06:00:23 executing program 1: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000280)={0x80, 0x0, "67cc9a2fcdc84da95d2833884e39739482c4760abd4e0a44bfc90885cd4f80a474cdcf3f50463474068eb7bc4306d94a9a6b6c97848e9714cc53d283e9d181120e48b3cad6a0de02415711b27819d9121938ca4b1512d8ff3c2d3e9efcb7a22c4d2e373cc571645be2b6340faeedc61c527991d982984204"}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_opts(r2, 0x0, 0x15, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = memfd_create(&(0x7f0000000080)='keyring[)mime_typewlan1-selinuxvboxnet0$nodeveth0\x00', 0x0) write(r5, &(0x7f0000000040)="06", 0x1) sendfile(r5, r5, &(0x7f0000001000), 0xffff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r6, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 06:00:23 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:23 executing program 3: creat(&(0x7f0000000700)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000640)='9p\x00', 0x0, &(0x7f00000000c0)={'trans=unix,', {[{@noextend='noextend'}]}}) 06:00:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000580)='/dev/video#\x00', 0x20004, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000140)={0xa, @raw_data="03962cc3d40d83c059a127ef9b00001c0bcfb5505ae14294c74e86756ad0750c2c951c6080ef96f63cd6ae427843a9852cdfee4825a5428929958efca95e06c231bde8547ca1dc78529d244b673512925336fa83c3760c732f3194ca3fa0b9019265c4ae1ce57f6f682f86e40782e52b313deb387d4bde0cfcf6d0e4a08dd1c21acb409d8bc1b3a051d195d81b453179d3409fe8251eb07631c27263950fa41a885d201db6909ab979ac78d083e42b029ed7a3595844000000000000000000000000003e00"}) 06:00:23 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:23 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$rfkill(r0, &(0x7f0000000000), 0x7826) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) [ 476.072410][T16790] 9pnet: p9_fd_create_unix (16790): problem connecting socket: ./file1: -2 06:00:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 06:00:23 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) read$rfkill(r0, &(0x7f0000000000), 0x7826) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 06:00:23 executing program 0: 06:00:24 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:24 executing program 4: 06:00:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 06:00:24 executing program 0: 06:00:24 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:24 executing program 1: 06:00:24 executing program 3: 06:00:24 executing program 0: 06:00:24 executing program 4: 06:00:24 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:24 executing program 0: 06:00:24 executing program 1: 06:00:24 executing program 3: 06:00:24 executing program 4: 06:00:25 executing program 1: 06:00:25 executing program 3: 06:00:25 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, 0x0, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:25 executing program 0: 06:00:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:25 executing program 4: 06:00:25 executing program 1: 06:00:25 executing program 3: 06:00:25 executing program 3: 06:00:25 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 06:00:25 executing program 4: 06:00:25 executing program 1: [ 478.193262][T16888] ttyS3: LSR safety check engaged! [ 478.229821][T16894] ttyS3: LSR safety check engaged! 06:00:25 executing program 3: 06:00:26 executing program 0: 06:00:26 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, 0x0, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:26 executing program 4: 06:00:26 executing program 3: 06:00:26 executing program 1: 06:00:26 executing program 0: 06:00:26 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:26 executing program 1: 06:00:26 executing program 3: 06:00:26 executing program 4: 06:00:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=ANY=[@ANYBLOB="0004040244bc6807fe88000000d069880b00000000000001fe8000000000000000000000000000bb"], 0x28) getsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, &(0x7f0000000100)) 06:00:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0xff67, 0x800) setsockopt$inet_opts(r1, 0x0, 0x12, &(0x7f0000000500)="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", 0x1000) r2 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="77ba05434ae2", [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x14, 0x11, 0x0, @remote, @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x5a]}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$LOOP_SET_FD(r5, 0x4c00, r7) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000e1ffffff0000010426d4", @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000080)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) dup(0xffffffffffffffff) 06:00:27 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002d0009e9d4e0a60064f5f5ffffffffff", @ANYRES32], 0x2}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 06:00:27 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, 0x0, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='~'], &(0x7f0000000240), 0x1000) 06:00:27 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x7, 0x0, 0x0) 06:00:27 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002d0009e9d4e0a60064f5f5ffffffffff", @ANYRES32], 0x2}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 06:00:27 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:27 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0xff67, 0x800) setsockopt$inet_opts(r1, 0x0, 0x12, &(0x7f0000000500)="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", 0x1000) r2 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="77ba05434ae2", [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x14, 0x11, 0x0, @remote, @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x5a]}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$LOOP_SET_FD(r5, 0x4c00, r7) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000e1ffffff0000010426d4", @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000080)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) dup(0xffffffffffffffff) 06:00:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0x800454d2, 0x0) 06:00:27 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 480.307012][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 480.312806][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:00:28 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:28 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:28 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 480.657641][T16989] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:00:28 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0xff67, 0x800) setsockopt$inet_opts(r1, 0x0, 0x12, &(0x7f0000000500)="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", 0x1000) r2 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="77ba05434ae2", [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x14, 0x11, 0x0, @remote, @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x5a]}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$LOOP_SET_FD(r5, 0x4c00, r7) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000e1ffffff0000010426d4", @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000080)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) dup(0xffffffffffffffff) 06:00:28 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:28 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:28 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:28 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:28 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0xff67, 0x800) setsockopt$inet_opts(r1, 0x0, 0x12, &(0x7f0000000500)="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", 0x1000) r2 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="77ba05434ae2", [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x14, 0x11, 0x0, @remote, @empty, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x0, 0x5a]}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$LOOP_SET_FD(r5, 0x4c00, r7) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d040000e1ffffff0000010426d4", @ANYRES32=r10, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000080)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) dup(0xffffffffffffffff) 06:00:29 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:29 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:29 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000380)={0x4, 0x0, 0x0, "c6fb101c"}) 06:00:29 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:29 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 06:00:29 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:29 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) 06:00:29 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 482.460459][ T28] device bridge_slave_1 left promiscuous mode [ 482.467999][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.561058][ T28] device bridge_slave_0 left promiscuous mode [ 482.568543][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.537266][ T28] device hsr_slave_0 left promiscuous mode [ 483.577047][ T28] device hsr_slave_1 left promiscuous mode [ 483.633897][ T28] team0 (unregistering): Port device team_slave_1 removed [ 483.644413][ T28] team0 (unregistering): Port device team_slave_0 removed [ 483.654227][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 483.690498][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 483.767999][ T28] bond0 (unregistering): Released all slaves [ 483.864804][T17049] IPVS: ftp: loaded support on port[0] = 21 [ 483.934263][T17049] chnl_net:caif_netlink_parms(): no params data found [ 484.006675][T17049] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.015789][T17049] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.024006][T17049] device bridge_slave_0 entered promiscuous mode [ 484.033756][T17049] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.041417][T17049] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.051440][T17049] device bridge_slave_1 entered promiscuous mode [ 484.071908][T17049] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 484.083589][T17049] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 484.106024][T17049] team0: Port device team_slave_0 added [ 484.115241][T17049] team0: Port device team_slave_1 added [ 484.200068][T17049] device hsr_slave_0 entered promiscuous mode [ 484.237821][T17049] device hsr_slave_1 entered promiscuous mode [ 484.268736][T17049] debugfs: Directory 'hsr0' with parent '/' already present! [ 484.282286][T17054] IPVS: ftp: loaded support on port[0] = 21 [ 484.282525][T17055] IPVS: ftp: loaded support on port[0] = 21 [ 484.302550][T17049] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.309722][T17049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.317180][T17049] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.324232][T17049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.405781][T17049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 484.435024][T17049] 8021q: adding VLAN 0 to HW filter on device team0 [ 484.452600][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 484.461230][ T7873] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.469309][ T7873] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.523821][T17055] chnl_net:caif_netlink_parms(): no params data found [ 484.533195][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 484.544429][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.551501][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.559681][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 484.568587][ T3512] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.575739][ T3512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.614061][T17054] chnl_net:caif_netlink_parms(): no params data found [ 484.635094][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 484.644236][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 484.658367][T17055] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.665440][T17055] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.673620][T17055] device bridge_slave_0 entered promiscuous mode [ 484.684043][T17055] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.691202][T17055] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.699165][T17055] device bridge_slave_1 entered promiscuous mode [ 484.706277][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 484.714714][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 484.730590][T17049] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 484.742701][T17049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 484.759476][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 484.786012][T17055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 484.805331][T17054] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.820161][T17054] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.828307][T17054] device bridge_slave_0 entered promiscuous mode [ 484.837802][T17055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 484.846863][T17054] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.856322][T17054] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.864681][T17054] device bridge_slave_1 entered promiscuous mode [ 484.887507][T17055] team0: Port device team_slave_0 added [ 484.899817][T17054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 484.912223][T17055] team0: Port device team_slave_1 added [ 484.929605][T17054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 484.951382][T17054] team0: Port device team_slave_0 added [ 484.989661][T17055] device hsr_slave_0 entered promiscuous mode [ 485.047473][T17055] device hsr_slave_1 entered promiscuous mode [ 485.087142][T17055] debugfs: Directory 'hsr0' with parent '/' already present! [ 485.097842][T17054] team0: Port device team_slave_1 added [ 485.112085][T17049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 485.130710][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 485.141322][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 485.209038][T17054] device hsr_slave_0 entered promiscuous mode [ 485.237672][T17054] device hsr_slave_1 entered promiscuous mode [ 485.287151][T17054] debugfs: Directory 'hsr0' with parent '/' already present! 06:00:33 executing program 1: openat$full(0xffffffffffffff9c, 0x0, 0x141005, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) syz_emit_ethernet(0x6e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x20, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:00:33 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r1, &(0x7f0000000600)={'\x9bF\x1b]P\x0e\x06C\xc3MY\x1d\x9b9%\a\x16\xb1\x9b=cy\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bL\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 06:00:33 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) [ 485.487435][T17055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.508088][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 485.516509][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.559188][T17055] 8021q: adding VLAN 0 to HW filter on device team0 [ 485.569098][T17054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.590357][ T26] audit: type=1804 audit(1576044033.261:42): pid=17070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 [ 485.620650][ T26] audit: type=1800 audit(1576044033.281:43): pid=17070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=0 [ 485.655974][T17054] 8021q: adding VLAN 0 to HW filter on device team0 [ 485.747664][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 485.756363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.765245][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.772288][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.780449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 485.789357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.798430][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.805487][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.814544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 485.822422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.830454][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 485.855929][T17055] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 485.866874][T17055] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 485.879191][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 485.887561][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 485.896532][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 485.905517][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 485.914915][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 485.924038][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 485.933030][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 485.941769][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.950241][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.957344][ T7658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.965043][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 485.973945][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 485.982607][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.991338][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.998447][ T7658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.006284][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 486.014758][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 486.023755][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 486.031558][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 486.039950][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 486.107755][T17055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 486.119763][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 486.127491][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 486.135032][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 486.144366][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 486.153129][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 486.162324][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 486.232616][T17054] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 486.243397][T17054] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 486.254900][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 486.263902][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 486.272651][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 486.281173][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 486.289842][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 486.298412][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 486.306806][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 486.415825][T17054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 486.433774][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 486.457242][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 06:00:34 executing program 3: 06:00:34 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:34 executing program 0: 06:00:34 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r1, &(0x7f0000000600)={'\x9bF\x1b]P\x0e\x06C\xc3MY\x1d\x9b9%\a\x16\xb1\x9b=cy\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bL\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 06:00:34 executing program 1: 06:00:34 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x0, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:34 executing program 3: [ 486.971819][ T26] audit: type=1804 audit(1576044034.641:44): pid=17103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 06:00:34 executing program 4: [ 487.060632][ T28] device bridge_slave_1 left promiscuous mode [ 487.066964][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.148004][ T28] device bridge_slave_0 left promiscuous mode [ 487.155438][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 06:00:34 executing program 4: [ 487.231672][ T28] device bridge_slave_1 left promiscuous mode [ 487.242306][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.311647][ T28] device bridge_slave_0 left promiscuous mode [ 487.319018][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 06:00:35 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:35 executing program 4: 06:00:35 executing program 4: 06:00:35 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x0, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:35 executing program 4: [ 489.627276][ T28] device hsr_slave_0 left promiscuous mode [ 489.677122][ T28] device hsr_slave_1 left promiscuous mode [ 489.743509][ T28] team0 (unregistering): Port device team_slave_1 removed [ 489.753850][ T28] team0 (unregistering): Port device team_slave_0 removed [ 489.763994][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 489.810587][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 489.880317][ T28] bond0 (unregistering): Released all slaves [ 489.997236][ T28] device hsr_slave_0 left promiscuous mode [ 490.067229][ T28] device hsr_slave_1 left promiscuous mode [ 490.113554][ T28] team0 (unregistering): Port device team_slave_1 removed [ 490.124236][ T28] team0 (unregistering): Port device team_slave_0 removed [ 490.134947][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 490.180648][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 490.249836][ T28] bond0 (unregistering): Released all slaves 06:00:38 executing program 0: 06:00:38 executing program 4: [ 490.450238][T17132] IPVS: ftp: loaded support on port[0] = 21 [ 490.450477][T17130] IPVS: ftp: loaded support on port[0] = 21 [ 490.727967][T17132] chnl_net:caif_netlink_parms(): no params data found [ 490.754499][T17130] chnl_net:caif_netlink_parms(): no params data found [ 490.805736][T17132] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.812916][T17132] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.824176][T17132] device bridge_slave_0 entered promiscuous mode [ 490.836628][T17132] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.847300][T17132] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.855287][T17132] device bridge_slave_1 entered promiscuous mode [ 490.865692][T17130] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.872801][T17130] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.881229][T17130] device bridge_slave_0 entered promiscuous mode [ 490.893298][T17130] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.900649][T17130] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.909254][T17130] device bridge_slave_1 entered promiscuous mode [ 490.922833][T17132] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 490.941889][T17132] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 490.966632][T17130] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 490.982710][T17130] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 490.998131][T17132] team0: Port device team_slave_0 added [ 491.009950][T17130] team0: Port device team_slave_0 added [ 491.016845][T17130] team0: Port device team_slave_1 added [ 491.024327][T17132] team0: Port device team_slave_1 added [ 491.158876][T17132] device hsr_slave_0 entered promiscuous mode [ 491.227473][T17132] device hsr_slave_1 entered promiscuous mode [ 491.309285][T17130] device hsr_slave_0 entered promiscuous mode [ 491.347663][T17130] device hsr_slave_1 entered promiscuous mode [ 491.387090][T17130] debugfs: Directory 'hsr0' with parent '/' already present! [ 491.404296][T17132] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.411367][T17132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.418753][T17132] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.425805][T17132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.439207][T17130] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.446409][T17130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.453853][T17130] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.461049][T17130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.506064][T17130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 491.529700][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.538382][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.546657][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.555154][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.571439][T17132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 491.584226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.592324][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 491.602453][T17130] 8021q: adding VLAN 0 to HW filter on device team0 [ 491.615424][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 491.624184][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 491.632627][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.639841][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.651351][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.659306][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 491.669396][T17132] 8021q: adding VLAN 0 to HW filter on device team0 [ 491.682910][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 491.692586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 491.704751][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.712068][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.738659][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 491.749025][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 491.762361][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 491.774806][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 491.788373][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.795818][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.806592][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 491.816418][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 491.826281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 491.835543][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 491.844522][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.851686][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.860344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 491.869685][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 491.879572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 491.900276][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 491.909160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 491.918410][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 491.927740][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 491.937060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 491.946158][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 491.954599][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 491.963549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 491.972703][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 491.985361][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 491.995073][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 492.005680][T17130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 492.024912][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 492.034026][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 492.049549][T17132] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 492.061421][T17132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 492.071782][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 492.082618][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 492.091400][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 492.099590][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 492.111057][T17130] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 492.135647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 492.151813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 492.163449][T17132] 8021q: adding VLAN 0 to HW filter on device batadv0 06:00:40 executing program 1: 06:00:40 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x0, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(r0, 0x713000, 0x715000) 06:00:40 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:40 executing program 0: 06:00:40 executing program 4: 06:00:40 executing program 3: 06:00:40 executing program 3: 06:00:40 executing program 1: 06:00:40 executing program 4: 06:00:40 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:40 executing program 4: 06:00:40 executing program 3: 06:00:40 executing program 1: 06:00:40 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(0xffffffffffffffff, 0x713000, 0x715000) 06:00:40 executing program 4: [ 494.557767][ T28] device bridge_slave_1 left promiscuous mode [ 494.563926][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.617733][ T28] device bridge_slave_0 left promiscuous mode [ 494.623924][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.668218][ T28] device bridge_slave_1 left promiscuous mode [ 494.674391][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.727604][ T28] device bridge_slave_0 left promiscuous mode [ 494.734090][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.769810][ T28] device bridge_slave_1 left promiscuous mode [ 494.776296][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.827824][ T28] device bridge_slave_0 left promiscuous mode [ 494.834001][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.707364][ T28] device hsr_slave_0 left promiscuous mode [ 496.737093][ T28] device hsr_slave_1 left promiscuous mode [ 496.793883][ T28] team0 (unregistering): Port device team_slave_1 removed [ 496.804449][ T28] team0 (unregistering): Port device team_slave_0 removed [ 496.814788][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 496.870915][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 496.927496][ T28] bond0 (unregistering): Released all slaves [ 497.077356][ T28] device hsr_slave_0 left promiscuous mode [ 497.127021][ T28] device hsr_slave_1 left promiscuous mode [ 497.193347][ T28] team0 (unregistering): Port device team_slave_1 removed [ 497.203721][ T28] team0 (unregistering): Port device team_slave_0 removed [ 497.213437][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 497.273751][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 497.368214][ T28] bond0 (unregistering): Released all slaves [ 497.517237][ T28] device hsr_slave_0 left promiscuous mode [ 497.567027][ T28] device hsr_slave_1 left promiscuous mode [ 497.623795][ T28] team0 (unregistering): Port device team_slave_1 removed [ 497.633790][ T28] team0 (unregistering): Port device team_slave_0 removed [ 497.644255][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 497.700625][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 497.778779][ T28] bond0 (unregistering): Released all slaves [ 497.886852][T17200] IPVS: ftp: loaded support on port[0] = 21 [ 497.939670][T17200] chnl_net:caif_netlink_parms(): no params data found [ 497.965118][T17200] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.972429][T17200] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.981375][T17200] device bridge_slave_0 entered promiscuous mode [ 497.989114][T17200] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.996180][T17200] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.004519][T17200] device bridge_slave_1 entered promiscuous mode [ 498.023194][T17200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 498.033994][T17200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 498.051529][T17200] team0: Port device team_slave_0 added [ 498.059163][T17200] team0: Port device team_slave_1 added [ 498.119493][T17200] device hsr_slave_0 entered promiscuous mode [ 498.157391][T17200] device hsr_slave_1 entered promiscuous mode [ 498.197133][T17200] debugfs: Directory 'hsr0' with parent '/' already present! [ 498.211684][T17200] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.219046][T17200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.226279][T17200] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.233958][T17200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.367152][T17200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 498.380564][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.391962][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.400329][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.416422][T17200] 8021q: adding VLAN 0 to HW filter on device team0 [ 498.427804][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 498.436448][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.443489][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.469184][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.478284][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.485341][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.495013][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 498.504217][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 498.513340][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 498.524771][T17200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 498.536360][T17200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 498.545516][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 498.554385][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 498.573154][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 498.581932][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 498.593261][T17200] 8021q: adding VLAN 0 to HW filter on device batadv0 06:00:46 executing program 0: 06:00:46 executing program 3: 06:00:46 executing program 4: 06:00:46 executing program 1: 06:00:46 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(0xffffffffffffffff, 0x713000, 0x715000) 06:00:46 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:46 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000002c0)=@req3={0x80000000}, 0x1c) listen(r0, 0x0) r1 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0x1c) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept$alg(0xffffffffffffffff, 0x713000, 0x715000) 06:00:46 executing program 1: 06:00:46 executing program 3: 06:00:46 executing program 4: 06:00:46 executing program 0: 06:00:46 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) io_setup(0x4a2, &(0x7f0000000000)) io_cancel(0x0, 0x0, 0x0) 06:00:46 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0xc042, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) dup2(r0, r1) open$dir(&(0x7f00000001c0)='./file0\x00', 0x83d, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 06:00:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x3, 0x0) fdatasync(r0) 06:00:46 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:47 executing program 4: mknod(&(0x7f0000000140)='./file1\x00', 0x88, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) clone(0x1ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x4040004) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x2, 0x0) close(r0) splice(r0, &(0x7f0000000040), r0, &(0x7f00000000c0), 0x7f, 0xf) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x68, r1, 0xf01, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x800) 06:00:47 executing program 0: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) exit(0x0) [ 499.618937][T17266] tty_tiocsserial: 'syz-executor.0' is using deprecated serial flags (with no effect): 00000200 06:00:47 executing program 5: mknod(&(0x7f0000000140)='./file1\x00', 0x88, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) write$P9_RWALK(r2, &(0x7f0000000040)={0x57, 0x6f, 0x0, {0x6, [{0x1a, 0x3, 0x1}, {0x0, 0x0, 0x5}, {0x4, 0x4, 0x6}, {}, {0x0, 0x3}, {0x0, 0x1}]}}, 0x57) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x0, r0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4040004) getsockname(r3, &(0x7f0000000180)=@alg, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x3a8, &(0x7f0000000000)={0x0}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = getpid() ptrace(0xffffffffffffffff, r4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 06:00:47 executing program 4: 06:00:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:47 executing program 5: 06:00:47 executing program 4: 06:00:47 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0xc042, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) dup2(r0, r1) open$dir(&(0x7f00000001c0)='./file0\x00', 0x83d, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) [ 500.389011][T17309] tty_tiocsserial: 'syz-executor.0' is using deprecated serial flags (with no effect): 00000200 06:00:48 executing program 1: 06:00:48 executing program 4: 06:00:48 executing program 5: 06:00:48 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:48 executing program 0: 06:00:48 executing program 3: 06:00:48 executing program 1: 06:00:48 executing program 5: 06:00:48 executing program 0: 06:00:48 executing program 4: 06:00:48 executing program 3: 06:00:48 executing program 1: 06:00:48 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:48 executing program 4: 06:00:48 executing program 5: 06:00:48 executing program 3: 06:00:48 executing program 0: 06:00:48 executing program 1: 06:00:49 executing program 4: 06:00:49 executing program 0: 06:00:49 executing program 5: 06:00:49 executing program 3: 06:00:49 executing program 1: 06:00:49 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:49 executing program 5: 06:00:49 executing program 4: 06:00:49 executing program 0: 06:00:49 executing program 1: 06:00:49 executing program 3: 06:00:49 executing program 5: 06:00:49 executing program 0: 06:00:49 executing program 4: 06:00:49 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:49 executing program 1: 06:00:49 executing program 3: 06:00:49 executing program 0: 06:00:49 executing program 5: 06:00:50 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x634c}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 06:00:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x200000, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e155667018001000000000067a2b4ecb75c5280fbca3ce9bbdc7e507976393196a1469f19f444f39200881b8afef96dbcbe63cb975d3b9983c3d54c3a794ec359a42e9c72d1369f22ee5c50c84688e04a145104f2f518453bec82bd0b54fdcb0a7bc4ac6cc4ea5f6506cb8e7280b85b22b167c2936a59ce61a000b10079795d86c292671cf2b3576b8c24dc5d84e0f9f17e6b890649994eaf071e4ca8ac2d6ce78e7ff14cc19e03274605baf2fffa6ad12c42b01f688768648830bf39d99954416c57cf"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 06:00:50 executing program 3: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) lookup_dcookie(0x0, 0x0, 0x0) 06:00:50 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="6d047c005d52994c0afc21be2900000047e2254bb7882b9abb2a2f9fb9399e0400c33f00102b0200000089da006a001499b2d1b3a4952f36def66e54a4c909c01e8c4e61f8a0e814f7e2acdd0063c7caa4"], 0x2) 06:00:50 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000600e85500dd0000040d000a00ea1102000005000000", 0x29}], 0x1) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 06:00:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001c00)=ANY=[@ANYBLOB="640000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000a002e0000003c0012000c00010069703667726500002c00020014000600149ef0e1be118746bbbf83fb842f55121400070032c6e6b6cb33cabacf730a75781fdb13"], 0x64}}, 0x0) [ 502.791028][T17435] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 06:00:50 executing program 5: socket$inet6(0xa, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r0 = creat(0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x8900, 0x0) write$apparmor_current(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080), 0x4) r3 = getpid() tkill(r3, 0x9) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000070001006671000034000200094534bf4bc76b7853000600000000000800030000000000080008400c00000008000100000000000800040000000000"], 0x60}}, 0x0) io_setup(0x0, &(0x7f0000000180)=0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r5, 0x82, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r6 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r6, 0xa00, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x1) [ 502.891671][T17435] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 06:00:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000600e85500dd0000040d000a00ea1102000005000000", 0x29}], 0x1) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 06:00:50 executing program 1: geteuid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x20600) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0xc6, 0x3f, 0x6, 0x7f, 0x0, 0x1000, 0x80040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x8ca5}, 0xc, 0x800, 0x400, 0x926b030cf46a9fa3, 0x22, 0x8, 0x1}, r1, 0x8, 0xffffffffffffffff, 0x8) openat$dir(0xffffffffffffff9c, 0x0, 0x400400, 0x0) r2 = getpid() tkill(r2, 0x9) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x1c\x00\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f@'}) 06:00:50 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 503.205662][T17456] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 06:00:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x200000) 06:00:50 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x9) write(0xffffffffffffffff, &(0x7f0000000040), 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x21) fcntl$dupfd(0xffffffffffffffff, 0x203, r1) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0xa100, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000000)=""/236) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0xffffffff, 0x1}, 0xc) close(r0) 06:00:51 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r1, &(0x7f0000000600)={'\\C\x1b(0\x0e\x06C\xc3MY\x1d\x9b8X\xc3\x16\xb1\x9b>my\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\x9bA\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', '\x9bd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\x1bM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 06:00:51 executing program 0: socket$inet(0x10, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x203, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0x101000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) init_module(&(0x7f0000000140)='trusted.overlay.origin\x00', 0x17, 0x0) pipe(0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30928, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x3) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 06:00:51 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getpid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) rename(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0\x00') 06:00:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:51 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000916, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0x1, 0x8000, 0x0, 0x4d) write$binfmt_elf32(r0, &(0x7f0000001000)=ANY=[@ANYBLOB="db3f06f8625dcf3f11000000dc4b9e3237d0cb0ac77c4e0000000000000008526c8b4741b92900fc00ebfbc0324e0ab4742038cf5a2ab545d6d15a8d32ee6c358f53186882f559eac27b30301f8fe21424983c437530b2411deb7ed069ca50ba39bff3cb3361235b45728489f9e45d793522658917072a47a400b8b64c48455f2c815d199009b497d59b988776787ee305d86e053adc92bd82fdbe772fd53e13c520bedf64f638035597e892dfd9947cb2f7619266ccb03092d2fc2e43281e4df2c960d9390317b9608dc023737f898cae5065a19fcd554a3c0d0a161bd961b43af340668e27467cce5087e1db6bbea0da27cce51961bf40f02a0931a5d29ca178ffaef158bd8c6d7a7148c528388792da27", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="0464d959e080b125773818ac153bee79603f675fb842bc9f7cec429860e1dfa34aae7ce70277eb17b97d66acb4bfd78b624ee32354746768eab624e026ba13d0494b91a86da5838adf1905f33e20f08a4e1aaed0fd9510c887b24ff0faa9c5bac659172bd560c6504f15d6706475cddfe9dbd36ce077279577d023ed8e875757133b743317135f7467caaec9d5525cb20563aaac6548e3b121c34f762ba9534cf2dadea8d828afcd939583c33b226465cbd216eccb16fa6eb8e2335c593797f537c1b7f0a300495696a2d6d5b6c6f3437a25e52521c983969f2af619463b482607c9c7508f0ef7d17dd1", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYPTR64=&(0x7f0000000dc0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYBLOB="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", @ANYRESOCT, @ANYPTR]], @ANYBLOB="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"/450, @ANYPTR64=&(0x7f00000008c0)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC, @ANYBLOB="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", @ANYRESDEC, @ANYRES32=0x0], @ANYRESHEX], 0xffffff1d) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) getpgrp(0x0) move_pages(0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000640)=[0x0, 0x0], 0x2) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) r3 = openat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) 06:00:51 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000680)={0x0, 0x2}, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 06:00:51 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 504.201794][T17487] : renamed from eql [ 504.218286][ T26] audit: type=1804 audit(1576044051.891:45): pid=17506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 06:00:52 executing program 4: socket$inet(0x10, 0x0, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x203, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0x101000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) [ 504.283559][ T26] audit: type=1804 audit(1576044051.931:46): pid=17508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 06:00:52 executing program 0: socket$inet(0x10, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x203, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0x101000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) init_module(&(0x7f0000000140)='trusted.overlay.origin\x00', 0x17, 0x0) pipe(0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30928, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x3) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 504.450284][T17517] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:00:52 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 504.493833][T17517] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:00:52 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 504.613136][T17525] : renamed from eql 06:00:52 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:00:52 executing program 0: socket$inet(0x10, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x203, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0x101000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) init_module(&(0x7f0000000140)='trusted.overlay.origin\x00', 0x17, 0x0) pipe(0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) pivot_root(0x0, 0x0) 06:00:52 executing program 4: socket$inet(0x10, 0x0, 0x4) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x203, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x9, 0x101000) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xdb45aa1) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) 06:00:52 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 504.867022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 504.872808][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:00:52 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x140000916, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf5, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f0000000040)="b9", 0x1, 0x8000, 0x0, 0x4d) write$binfmt_elf32(r0, &(0x7f0000001000)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES32, @ANYRES64, @ANYBLOB="0464d959e080b125773818ac153bee79603f675fb842bc9f7cec429860e1dfa34aae7ce70277eb17b97d66acb4bfd78b624ee32354746768eab624e026ba13d0494b91a86da5838adf1905f33e20f08a4e1aaed0fd9510c887b24ff0faa9c5bac659172bd560c6504f15d6706475cddfe9dbd36ce077279577d023ed8e875757133b743317135f7467caaec9d5525cb20563aaac6548e3b121c34f762ba9534cf2dadea8d828afcd939583c33b226465cbd216eccb16fa6eb8e2335c593797f537c1b7f0a300495696a2d6d5b6c6f3437a25e52521c983969f2af619463b482607c9c7508f0ef7d17dd1", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES16, @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESHEX, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYPTR64=&(0x7f0000000dc0)=ANY=[@ANYPTR, @ANYRESHEX, @ANYBLOB="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", @ANYRESOCT, @ANYPTR]], @ANYBLOB="b7e73a1d2edd3910dcaeab8c30d059d1eb1665345e000000000000800112130be48d7b1397f69b5aee61355b5ec6a8395a8c5a833203a695734ab0abab5a26801fa1ef510f4b8737e3750602d2721607a8bb4bee07eb9528c12e1e70aa48288b10a0a9d602601e4c6cafad2067d98fd2c165ef0fa928881fa85e9e023fd6bbb74bece396aad11947d50bd58a49c4ad3497022590ef45c7f4666193d7531ad97c7a77fcece5b04214b12c00b972a44b0fe2fe2233d9fbf99667588930b3b36eb34d34d28fc93050e20e0a27e9032ed8f207747c7cf6c870de9d800e74131b04d3933f77f091980207359d67cfbbbce18c246bd082af616ef6fd993b52ed245b5999341385e8596d9a144557817c8c6df9fb28215d3a67a2c20f0b4a15fca980d34f503612ed36c3d13272db440f0d040338fde7777fe67d6a55137f27d953cca32920f36d122a2e889c42e6d44328e4d338a0bd195ba8e46a0f7c6c49ede7961e0f28c4791284e3ed9c14720ace4e39239ed67d399eca61a04eac3e9b1f0b000000000000b14425753311fd3d47a812ef5be5112250895b5892d09f7e2022d6afb5bfe7eac95c479b28e6091b573cbbfdb09816ba4f00"/450, @ANYPTR64=&(0x7f00000008c0)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC, @ANYBLOB="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", @ANYRESDEC, @ANYRES32=0x0], @ANYRESHEX], 0xffffff1d) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) getpgrp(0x0) move_pages(0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000640)=[0x0, 0x0], 0x2) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) r3 = openat$cgroup(r2, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) 06:00:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0xf257ed32702e7d48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:su_exec_t:s0\x00', 0x1f, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) [ 505.247702][T17554] : renamed from eql 06:00:53 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:53 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x3, 0x0, @local, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000001c0)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 06:00:53 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 06:00:53 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 06:00:53 executing program 4: socket$inet(0x10, 0x0, 0x4) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x203, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8923, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x9, 0x101000) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xdb45aa1) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) 06:00:53 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:53 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800, 0x0, 0x0, 0x9ff8efa2325ad5a0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10001, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x52, 0x70, 0x0, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x705, 0x1, @perf_bp={0x0}, 0x10000, 0x0, 0x7, 0x0, 0xfc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:00:53 executing program 5: [ 506.167359][T17613] : renamed from eql [ 506.639815][ T670] device bridge_slave_1 left promiscuous mode [ 506.661671][ T670] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.689563][T17630] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 506.703351][T17630] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 506.715934][T17630] EXT4-fs (loop3): orphan cleanup on readonly fs [ 506.723006][T17630] EXT4-fs error (device loop3): ext4_orphan_get:1252: comm syz-executor.3: bad orphan inode 274796944 [ 506.734243][ T670] device bridge_slave_0 left promiscuous mode [ 506.735100][T17630] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 506.743655][ T670] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.507419][ T670] device hsr_slave_0 left promiscuous mode [ 507.567077][ T670] device hsr_slave_1 left promiscuous mode [ 507.653552][ T670] team0 (unregistering): Port device team_slave_1 removed [ 507.664238][ T670] team0 (unregistering): Port device team_slave_0 removed [ 507.674303][ T670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 507.710651][ T670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 507.787045][ T670] bond0 (unregistering): Released all slaves [ 507.894034][T17644] IPVS: ftp: loaded support on port[0] = 21 [ 507.944736][T17644] chnl_net:caif_netlink_parms(): no params data found [ 507.972298][T17644] bridge0: port 1(bridge_slave_0) entered blocking state [ 507.979487][T17644] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.987559][T17644] device bridge_slave_0 entered promiscuous mode [ 507.995079][T17644] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.002227][T17644] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.009926][T17644] device bridge_slave_1 entered promiscuous mode [ 508.066793][T17644] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 508.078801][T17644] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 508.100755][T17644] team0: Port device team_slave_0 added [ 508.110903][T17644] team0: Port device team_slave_1 added [ 508.171722][T17644] device hsr_slave_0 entered promiscuous mode [ 508.219678][T17644] device hsr_slave_1 entered promiscuous mode [ 508.264004][T17644] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.271101][T17644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.278439][T17644] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.285523][T17644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.330938][T17644] 8021q: adding VLAN 0 to HW filter on device bond0 [ 508.343539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 508.354728][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.362772][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.378727][T17644] 8021q: adding VLAN 0 to HW filter on device team0 [ 508.392562][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 508.401454][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.408500][ T7658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.428139][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 508.436690][ T7873] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.443728][ T7873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.461945][T17644] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 508.472692][T17644] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 508.485534][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 508.494896][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 508.503743][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 508.512365][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 508.520638][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 508.528495][ T7873] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 508.547232][T17644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 508.555116][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 508.563034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 508.739403][T17654] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:00:56 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) 06:00:56 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40800, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x200000, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e155667018001000000000067a2b4ecb75c5280fbca3ce9bbdc7e507976393196a1469f19f444f39200881b8afef96dbcbe63cb975d3b9983c3d54c3a794ec359a42e9c72d1369f22ee5c50c84688e04a145104f2f518453bec82bd0b54fdcb0a7bc4ac6cc4ea5f6506cb8e7280b85b22b167c2936a59ce61a000b10079795d86c292671cf2b3576b8c24dc5d84e0f9f17e6b890649994eaf071e4ca8ac2d6ce78e7ff14cc19e03274605baf2fffa6ad12c42b01f688768648830bf39d99954416c57"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 06:00:56 executing program 5: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00', 0x1}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x2001) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9], 0x1f000}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x2df, 0x0, 0x0, 0xfffffe41) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 06:00:56 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:56 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="390000007200090468fe07002b00e8ff4000ff07f100b600ff24171500010003000000000000117cfc63d92380334acd6ee9ea429db8a05ac4", 0x39}], 0x1) 06:00:56 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800, 0x0, 0x0, 0x9ff8efa2325ad5a0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10001, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x52, 0x70, 0x0, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x705, 0x1, @perf_bp={0x0}, 0x10000, 0x0, 0x7, 0x0, 0xfc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:00:56 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800, 0x0, 0x0, 0x9ff8efa2325ad5a0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10001, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x52, 0x70, 0x0, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x705, 0x1, @perf_bp={0x0}, 0x10000, 0x0, 0x7, 0x0, 0xfc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 06:00:56 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) [ 509.243219][T17660] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 509.307196][T17660] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:57 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 509.355802][T17660] EXT4-fs (loop3): orphan cleanup on readonly fs [ 509.379698][T17660] EXT4-fs error (device loop3): ext4_orphan_get:1252: comm syz-executor.3: bad orphan inode 274796944 06:00:57 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) [ 509.407509][T17660] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:00:57 executing program 5: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00', 0x1}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x2001) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9], 0x1f000}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x2df, 0x0, 0x0, 0xfffffe41) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 509.635678][T17681] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 509.694907][T17681] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 06:00:57 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800, 0x0, 0x0, 0x9ff8efa2325ad5a0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10001, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x52, 0x70, 0x0, 0x0, 0x5, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x705, 0x1, @perf_bp={0x0}, 0x10000, 0x0, 0x7, 0x0, 0xfc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 509.738246][T17681] EXT4-fs (loop4): orphan cleanup on readonly fs [ 509.744883][T17681] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 274796944 [ 509.793015][T17681] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:00:57 executing program 5: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00', 0x1}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x2001) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9], 0x1f000}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x2df, 0x0, 0x0, 0xfffffe41) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 510.546648][T17712] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 510.581878][T17712] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 510.604356][T17712] EXT4-fs (loop3): orphan cleanup on readonly fs [ 510.618607][T17712] EXT4-fs error (device loop3): ext4_orphan_get:1252: comm syz-executor.3: bad orphan inode 274796944 [ 510.631951][T17712] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:00:58 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, 0x0, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:00:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x20}}, 0x20) 06:00:58 executing program 5: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00', 0x1}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x2001) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9], 0x1f000}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x2df, 0x0, 0x0, 0xfffffe41) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 06:00:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) request_key(&(0x7f0000000100)='cifs.spnego\x00', 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x227d, &(0x7f0000000780)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, 0x0) 06:00:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 511.077590][ T28] device bridge_slave_1 left promiscuous mode [ 511.083793][ T28] bridge0: port 2(bridge_slave_1) entered disabled state 06:00:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 511.167864][ T28] device bridge_slave_0 left promiscuous mode [ 511.183113][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 06:00:59 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) syz_open_dev$sndseq(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 06:00:59 executing program 3: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x10) [ 512.187187][ T28] device hsr_slave_0 left promiscuous mode [ 512.257035][ T28] device hsr_slave_1 left promiscuous mode [ 512.323260][ T28] team0 (unregistering): Port device team_slave_1 removed [ 512.333749][ T28] team0 (unregistering): Port device team_slave_0 removed [ 512.343770][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 512.390199][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 512.468214][ T28] bond0 (unregistering): Released all slaves [ 512.602883][T17775] IPVS: ftp: loaded support on port[0] = 21 [ 512.748880][T17775] chnl_net:caif_netlink_parms(): no params data found [ 512.781353][T17775] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.790354][T17775] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.800217][T17775] device bridge_slave_0 entered promiscuous mode [ 512.810067][T17775] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.817601][T17775] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.825724][T17775] device bridge_slave_1 entered promiscuous mode [ 512.849431][T17775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 512.860940][T17775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 512.883844][T17775] team0: Port device team_slave_0 added [ 512.892617][T17775] team0: Port device team_slave_1 added [ 512.999997][T17775] device hsr_slave_0 entered promiscuous mode [ 513.058047][T17775] device hsr_slave_1 entered promiscuous mode [ 513.115182][T17775] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.122273][T17775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 513.129551][T17775] bridge0: port 1(bridge_slave_0) entered blocking state [ 513.136579][T17775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 513.171686][T17775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 513.184508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 513.193605][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 513.204111][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.216248][T17775] 8021q: adding VLAN 0 to HW filter on device team0 [ 513.226904][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 513.235512][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 513.242657][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 513.253414][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 513.262009][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 513.269056][ T7658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 513.287539][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 513.296497][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 513.314647][T17775] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 513.327918][T17775] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 513.342016][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 513.350817][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 513.359458][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 513.376067][T17775] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 513.383373][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 513.391176][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 513.399488][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 513.510218][T17787] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:01 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x14e000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x1, 0x3f, 0x6, 0x0, 0x0, 0x2000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x101, 0x10001, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 06:01:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29}], 0x18}], 0x146, 0x0) 06:01:01 executing program 3: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x8}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x10) 06:01:01 executing program 4: 06:01:01 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:01 executing program 4: 06:01:01 executing program 0: 06:01:01 executing program 5: 06:01:01 executing program 3: 06:01:01 executing program 4: 06:01:01 executing program 0: 06:01:01 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:01 executing program 3: 06:01:01 executing program 5: 06:01:01 executing program 4: 06:01:01 executing program 0: 06:01:01 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:01 executing program 5: 06:01:01 executing program 3: 06:01:01 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:02 executing program 4: 06:01:02 executing program 3: 06:01:02 executing program 0: 06:01:02 executing program 5: 06:01:02 executing program 4: 06:01:02 executing program 5: 06:01:02 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:02 executing program 3: 06:01:02 executing program 0: 06:01:02 executing program 3: 06:01:02 executing program 5: [ 515.817583][ T670] device bridge_slave_1 left promiscuous mode [ 515.823790][ T670] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.867589][ T670] device bridge_slave_0 left promiscuous mode [ 515.873756][ T670] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.567387][ T670] device hsr_slave_0 left promiscuous mode [ 516.607074][ T670] device hsr_slave_1 left promiscuous mode [ 516.653607][ T670] team0 (unregistering): Port device team_slave_1 removed [ 516.663854][ T670] team0 (unregistering): Port device team_slave_0 removed [ 516.673824][ T670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 516.731307][ T670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 516.809758][ T670] bond0 (unregistering): Released all slaves [ 516.923540][T17876] IPVS: ftp: loaded support on port[0] = 21 [ 516.973755][T17876] chnl_net:caif_netlink_parms(): no params data found [ 516.999466][T17876] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.006573][T17876] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.014313][T17876] device bridge_slave_0 entered promiscuous mode [ 517.022122][T17876] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.029308][T17876] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.036875][T17876] device bridge_slave_1 entered promiscuous mode [ 517.105914][T17876] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 517.120218][T17876] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 517.142534][T17876] team0: Port device team_slave_0 added [ 517.149532][T17876] team0: Port device team_slave_1 added [ 517.239311][T17876] device hsr_slave_0 entered promiscuous mode [ 517.278197][T17876] device hsr_slave_1 entered promiscuous mode [ 517.333674][T17876] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.340756][T17876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.349026][T17876] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.356087][T17876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.391090][T17876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 517.403937][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 517.413060][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.421407][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.434399][T17876] 8021q: adding VLAN 0 to HW filter on device team0 [ 517.445936][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 517.455111][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.462255][ T7675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.479871][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 517.488477][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.495496][ T7658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.514631][T17876] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 517.525292][T17876] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 517.538563][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 517.547829][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 517.556418][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 517.565176][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 517.573675][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 517.581429][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 517.597762][T17876] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 517.605313][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 517.612976][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 06:01:05 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:05 executing program 4: 06:01:05 executing program 3: 06:01:05 executing program 0: 06:01:05 executing program 5: 06:01:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:05 executing program 4: 06:01:05 executing program 0: 06:01:05 executing program 3: 06:01:05 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000180)) 06:01:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) 06:01:05 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$sndseq(r2, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @addr}], 0x30) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ftruncate(r3, 0xfff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) time(&(0x7f00000000c0)) r4 = getpid() sched_setattr(r4, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001480)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 06:01:06 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) fchmod(r2, 0x0) ftruncate(r1, 0x0) 06:01:06 executing program 3: shmget(0x2, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) 06:01:06 executing program 5: select(0x40, &(0x7f0000000180)={0x1}, 0x0, 0x0, 0x0) 06:01:06 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:06 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 518.494755][T17920] devpts: called with bogus options [ 518.592699][ T26] audit: type=1800 audit(1576044066.261:47): pid=17927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17009 res=0 06:01:06 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) 06:01:06 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) time(0x0) [ 518.666377][ T26] audit: type=1800 audit(1576044066.291:48): pid=17927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17009 res=0 [ 518.753596][ T26] audit: type=1800 audit(1576044066.391:49): pid=17927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17009 res=0 06:01:06 executing program 0: getcwd(&(0x7f0000000000)=""/95, 0x5f) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) pipe(0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept$unix(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000002c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000cc0)={0x18, 0xd, 0x1, {{0x80, 0x4}, 0x158}}, 0x18) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@rand_addr="a7e25454e7d7d6c9fe28836be7885cd1", @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x3f, 0x4e22, 0x0, 0x0, 0x0, 0x20, 0x73}, {0x7fffffff, 0x3, 0x0, 0x0, 0x2, 0x8, 0x4}, {0x0, 0x2, 0x2}}, {{@in6=@loopback, 0x4d6}, 0xd15793b9fb15757b, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6da}}, 0xe8) pipe(0x0) [ 518.902982][ T26] audit: type=1804 audit(1576044066.391:50): pid=17921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/28/file0/file0" dev="sda1" ino=17009 res=1 06:01:06 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x40000000003a, 0x43ff, @local, @mcast2, {[], @icmpv6=@mld={0x87, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 06:01:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f0000000080)) 06:01:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:01:06 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xf7\xff\x00', {0x2, 0x0, @multicast2}}) 06:01:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f0000000200)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) 06:01:07 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:07 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) lgetxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', 0x0, 0x0) [ 520.399839][ T7] device bridge_slave_1 left promiscuous mode [ 520.408636][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.447960][ T7] device bridge_slave_0 left promiscuous mode [ 520.454327][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.137563][ T7] device hsr_slave_0 left promiscuous mode [ 521.227102][ T7] device hsr_slave_1 left promiscuous mode [ 521.283361][ T7] team0 (unregistering): Port device team_slave_1 removed [ 521.294422][ T7] team0 (unregistering): Port device team_slave_0 removed [ 521.304622][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 521.350852][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 521.446684][ T7] bond0 (unregistering): Released all slaves [ 521.553745][T18002] IPVS: ftp: loaded support on port[0] = 21 [ 521.604693][T18002] chnl_net:caif_netlink_parms(): no params data found [ 521.630328][T18002] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.637413][T18002] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.645321][T18002] device bridge_slave_0 entered promiscuous mode [ 521.652774][T18002] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.659845][T18002] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.668225][T18002] device bridge_slave_1 entered promiscuous mode [ 521.728931][T18002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 521.739873][T18002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 521.758412][T18002] team0: Port device team_slave_0 added [ 521.765405][T18002] team0: Port device team_slave_1 added [ 521.819419][T18002] device hsr_slave_0 entered promiscuous mode [ 521.869960][T18002] device hsr_slave_1 entered promiscuous mode [ 521.917261][T18002] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.924583][T18002] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.931978][T18002] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.939093][T18002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.980874][T18002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 521.997581][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 522.006248][ T3512] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.016385][ T3512] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.032569][T18002] 8021q: adding VLAN 0 to HW filter on device team0 [ 522.043938][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 522.055687][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.062745][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 522.090658][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 522.101758][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.109328][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 522.118631][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 522.128666][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 522.137542][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 522.146350][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 522.158717][T18002] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 522.169829][T18002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 522.190103][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 522.205299][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 522.214860][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 522.225694][T18002] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:10 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:10 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) flistxattr(r0, 0x0, 0x0) 06:01:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$sndseq(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001480)={0x14, 0x17, 0x101}, 0x14}}, 0x0) 06:01:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 522.550206][T18023] ttyS3: LSR safety check engaged! [ 522.579802][ T26] audit: type=1800 audit(1576044070.251:51): pid=18020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=26 res=0 [ 522.608988][T18028] ttyS3: LSR safety check engaged! 06:01:10 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000240)={0x5f, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 522.632013][ T26] audit: type=1800 audit(1576044070.261:52): pid=18020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=26 res=0 06:01:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:01:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000240)={0x28, 0x0, 0x7fc, 0x0, 0x0, 0x2, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 522.824097][T18039] ttyS3: LSR safety check engaged! [ 522.885071][T18039] ttyS3: LSR safety check engaged! 06:01:10 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 522.906668][T18043] ttyS3: LSR safety check engaged! [ 522.953358][T18046] ttyS3: LSR safety check engaged! 06:01:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:10 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000240)={0x5f, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 522.984225][ T26] audit: type=1800 audit(1576044070.651:53): pid=18036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=26 res=0 06:01:10 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:10 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x28, 0x0, 0x7fc, 0x4, 0xfffffffc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}) [ 523.140049][T18046] ttyS3: LSR safety check engaged! [ 523.226477][ T26] audit: type=1804 audit(1576044070.891:54): pid=18032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/31/file0/file0" dev="loop0" ino=26 res=1 [ 523.262062][T18057] ttyS3: LSR safety check engaged! [ 523.331729][ T26] audit: type=1804 audit(1576044070.921:55): pid=18020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/31/file0/file0" dev="loop0" ino=26 res=1 [ 523.356231][T18058] ttyS3: LSR safety check engaged! 06:01:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x56}, 0x8) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) [ 523.406188][T18057] ttyS3: LSR safety check engaged! 06:01:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:11 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x28, 0x0, 0x7fc, 0x0, 0xfffffffc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:01:11 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000240)={0x5f, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:01:11 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:11 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getresgid(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) pipe2(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) getgid() syz_open_procfs(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pipe2(0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fstat(0xffffffffffffffff, 0x0) sendmsg$unix(r1, 0x0, 0x0) [ 523.896246][ T26] audit: type=1800 audit(1576044071.561:56): pid=18081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=27 res=0 06:01:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x0) [ 524.030114][ T26] audit: type=1800 audit(1576044071.621:57): pid=18092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=27 res=0 06:01:11 executing program 5: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x8) r1 = gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0xffffffffffffff9d) tkill(r1, 0x1000000000016) 06:01:11 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000240)={0x5f, 0x0, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:01:12 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 524.680403][ T26] audit: type=1800 audit(1576044072.351:58): pid=18106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=27 res=0 [ 524.795573][T18106] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 524.887022][T18106] FAT-fs (loop0): Filesystem has been set read-only [ 524.909753][ T7] device bridge_slave_1 left promiscuous mode [ 524.916151][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.987733][ T7] device bridge_slave_0 left promiscuous mode [ 524.994002][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.697210][ T7] device hsr_slave_0 left promiscuous mode [ 525.767109][ T7] device hsr_slave_1 left promiscuous mode [ 525.833926][ T7] team0 (unregistering): Port device team_slave_1 removed [ 525.844188][ T7] team0 (unregistering): Port device team_slave_0 removed [ 525.855004][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 525.880286][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 525.984768][ T7] bond0 (unregistering): Released all slaves [ 526.073466][T18131] IPVS: ftp: loaded support on port[0] = 21 [ 526.125677][T18131] chnl_net:caif_netlink_parms(): no params data found [ 526.152233][T18131] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.159393][T18131] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.167259][T18131] device bridge_slave_0 entered promiscuous mode [ 526.174722][T18131] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.181889][T18131] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.189635][T18131] device bridge_slave_1 entered promiscuous mode [ 526.241374][T18131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 526.252502][T18131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 526.274578][T18131] team0: Port device team_slave_0 added [ 526.284335][T18131] team0: Port device team_slave_1 added [ 526.351872][T18131] device hsr_slave_0 entered promiscuous mode [ 526.407441][T18131] device hsr_slave_1 entered promiscuous mode [ 526.465001][T18131] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.472141][T18131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.479506][T18131] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.486618][T18131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.530750][T18131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 526.543501][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 526.555461][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.563868][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.579504][T18131] 8021q: adding VLAN 0 to HW filter on device team0 [ 526.591019][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 526.601553][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 526.608602][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 526.629937][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 526.638861][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 526.645902][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 526.654903][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 526.663790][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 526.673150][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 526.684037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 526.695455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 526.705645][T18131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 526.720295][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 526.728197][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.738717][T18131] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 526.871847][T18141] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:14 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e005f0214fffffffffffff8070000000000000000000000080008000d000000", 0x24) 06:01:14 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb76ea7211439a321f589f32be513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b143521435cb49840b0f61274420a5d97"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x2bb19afb0fa4f39f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @dev}, @IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x40}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 06:01:14 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @hyper}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) syz_open_procfs(0x0, 0x0) creat(&(0x7f0000000140)='./file1\x00', 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 06:01:14 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 527.124556][ T26] audit: type=1800 audit(1576044074.791:59): pid=18147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=28 res=0 06:01:14 executing program 4: [ 527.190283][ T26] audit: type=1800 audit(1576044074.851:60): pid=18147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=28 res=0 06:01:15 executing program 3: 06:01:15 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:15 executing program 3: 06:01:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x76, &(0x7f00000002c0)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "4c000f", 0x40, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d4cae2", 0x0, 0x0, 0x0, @loopback, @mcast2, [@hopopts={0x3a}], "0200000000000000"}}}}}}}, 0x0) [ 527.506129][ T26] audit: type=1800 audit(1576044075.171:61): pid=18166 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=28 res=0 06:01:15 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0x8800) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cce", 0x551}], 0x1) 06:01:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/89}, {&(0x7f0000000400)=""/151}, {&(0x7f0000000580)=""/255}, {&(0x7f0000000680)=""/155}], 0x0, &(0x7f00000004c0)=""/151, 0x97}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000380)="0f20e06635000002000f22e00f35ba61000fc7ae060066efbaf80c66b8e8ee668466efbafc0cec26e0480f019a91d10f2363d231f33eff45003420e06635000004000f22e0", 0x45}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:15 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 527.776252][T18171] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 06:01:15 executing program 4: 06:01:15 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:15 executing program 5: 06:01:15 executing program 3: 06:01:15 executing program 4: 06:01:16 executing program 5: [ 528.362076][ T26] audit: type=1800 audit(1576044076.031:62): pid=18206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=29 res=0 06:01:16 executing program 3: [ 528.452442][T18205] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 528.472787][ T26] audit: type=1800 audit(1576044076.101:63): pid=18206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=29 res=0 06:01:16 executing program 5: 06:01:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:16 executing program 4: [ 529.093165][ T26] audit: type=1800 audit(1576044076.761:64): pid=18225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=29 res=0 06:01:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) [ 529.446992][ T26] audit: type=1800 audit(1576044077.111:65): pid=18247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=30 res=0 [ 529.510483][ T26] audit: type=1800 audit(1576044077.121:66): pid=18247 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=30 res=0 [ 529.589930][ T28] device bridge_slave_1 left promiscuous mode [ 529.596144][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.649978][ T28] device bridge_slave_0 left promiscuous mode [ 529.656693][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.377269][ T28] device hsr_slave_0 left promiscuous mode [ 530.417162][ T28] device hsr_slave_1 left promiscuous mode [ 530.473068][ T28] team0 (unregistering): Port device team_slave_1 removed [ 530.484097][ T28] team0 (unregistering): Port device team_slave_0 removed [ 530.494430][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 530.520900][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 530.591057][ T28] bond0 (unregistering): Released all slaves [ 530.723624][T18255] IPVS: ftp: loaded support on port[0] = 21 [ 530.773188][T18255] chnl_net:caif_netlink_parms(): no params data found [ 530.798665][T18255] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.805732][T18255] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.813548][T18255] device bridge_slave_0 entered promiscuous mode [ 530.821219][T18255] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.828314][T18255] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.835985][T18255] device bridge_slave_1 entered promiscuous mode [ 530.896225][T18255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 530.907079][T18255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 530.926289][T18255] team0: Port device team_slave_0 added [ 530.933052][T18255] team0: Port device team_slave_1 added [ 531.011934][T18255] device hsr_slave_0 entered promiscuous mode [ 531.089435][T18255] device hsr_slave_1 entered promiscuous mode [ 531.156641][T18255] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.163762][T18255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.171044][T18255] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.178079][T18255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.218945][T18255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 531.232788][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 531.242993][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.252316][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.265441][T18255] 8021q: adding VLAN 0 to HW filter on device team0 [ 531.277288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 531.285798][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.292870][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.308694][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 531.317841][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.324861][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.337862][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 531.354143][T18255] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 531.364828][T18255] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 531.380171][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 531.389635][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 531.400096][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 531.409780][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 531.419380][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 531.434939][T18255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 531.442985][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 531.455836][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.565345][T18265] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:19 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:19 executing program 3: 06:01:19 executing program 4: 06:01:19 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:19 executing program 5: 06:01:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) 06:01:19 executing program 4: 06:01:19 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000700)=[{&(0x7f0000000400)="adbdc4af6c06a06128a1b191818fb3d036c2b3e69141ba576ca740097ce7918ecb6e063bf6", 0x25}, {&(0x7f0000000440)="def602e8e66f6f74a08ec8dee7e1168026f17897a2ca244cbfc0c4d335cafdcd55aac195c621b6ace0c7ba4f2cc3c9fea051be3105addb5945533392c447de4f2e596810efd0f2d3f2a2113897b1a73e6a1525a2cebc22a6be5dd9fe", 0x5c}, {&(0x7f00000004c0)="d96c44b5aacdffb9d00c63485fff9334d5ed8114c38e56e1f321a7a4c291e9f2b8acabf592045b76ef49306d60634240b0b3cae756dfb68086cf17fe7c59809267dab0170c10e3a113855770e58d2f2b9e5ccccc287fd015dfe0adabdfce7106e88b47f38442a6a089aa7d72264a481764883f28e8c44d94c675473e9116db0b97ffc8fe2f2c73ccb97d50f4e223265d30180b9225ead0aa78af8895ba5c8b166e83a2786c094c95dbc035dfe714", 0xae}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000000580)="f6001defdff9096b148950255ecb8095a26b2699dcfd8a72ddd1aafff4e3cbce30c22093a0dacc7c0b63d12c452bdd130eeb77b3bbc90cd0ae75e42513b62b6d5af16829d82815ee1e24537e19016836b53e8393c4fa2caca8bcdc", 0x5b}, {&(0x7f0000000600)="81e5c222cef2e9a4cff4d824e7f7f910b540edb3a6aa065086469400a2eeaf498e6495f863154ac3b2e44fd2f24a4433d724", 0x32}, {&(0x7f0000000640)="e68dc6e8bcbc3e45d9aff2e8fb54d086c870d0d49424148d50b1e91afde9a8bc29367cd38036c3fbba7becd5f03399fe5900e2ca6c6825f6b213ac31da5865af17d890764a1ab1bd3411bf019588929127f6553a4f4fd5d10215d329c13deb8b05686e88b9cbfb56ed3c787cb51f5302ab4cf1a9f88468ef4ff9d1ae0342dfe17d7348d550a494e1e80f7ac0055de87cdb2d6c40402260a8227a6db55a472d6fa28cffd35545759da095ea91edb3a54337d9befee45245a5e5f449128c21e3a6", 0xc0}], 0x313, 0x8) [ 531.761300][ T26] audit: type=1800 audit(1576044079.431:67): pid=18271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=31 res=0 06:01:19 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x75, 0xee67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)=""/26, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RLERROR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000070100050073797a310051c780917f109b2ab9d379298c921ed05482f7202d2c6b68c23fda0000000078e8774377f7d0aa0b24f6e77b99d8"], 0x3c) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 531.834015][ T26] audit: type=1800 audit(1576044079.461:68): pid=18271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=31 res=0 06:01:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x140001, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 06:01:19 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) [ 532.093941][T18278] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 06:01:19 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:20 executing program 5: shmget(0x2, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="99245b2e6972731d959a35fdda251e35ceb8ee43918959f7dd7b24d017bea99bcdbbb8a6b67464cb73e2a641e8ca5f85c082b2f3692082a4a4ef49fe789ca3ca92403dc6143c6246066422fc8d18fe2d0a90e12cd6c49af49d10783a6e1a45bd59c6c6", 0x30837c0d}], 0x1, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ftruncate(r3, 0x28007d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x0) 06:01:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:20 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 06:01:20 executing program 4: shmget(0x2, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 06:01:20 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 532.539982][T18307] devpts: called with bogus options 06:01:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000280)) [ 532.656910][ T26] audit: type=1804 audit(1576044080.321:69): pid=18317 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir151897928/syzkaller.Wg1yOf/478/file0" dev="sda1" ino=16769 res=1 06:01:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x2, 0x4) [ 532.796043][ T26] audit: type=1804 audit(1576044080.431:70): pid=18317 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir151897928/syzkaller.Wg1yOf/478/file0" dev="sda1" ino=16769 res=1 06:01:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:01:20 executing program 4: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, 0x0) [ 533.074632][ T26] audit: type=1800 audit(1576044080.741:71): pid=18333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=32 res=0 06:01:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5ca85b3a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 533.168422][ T26] audit: type=1800 audit(1576044080.761:72): pid=18333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=32 res=0 06:01:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 06:01:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x9, 0x0, &(0x7f0000000100)) [ 533.351379][T18344] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 06:01:21 executing program 3: r0 = socket(0x0, 0x8000e, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = dup2(r0, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$inet(0x2, 0x80a, 0x0) r6 = socket$inet(0x2, 0x80a, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x5c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='bridge_slave_1\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'vlan0\x00'}) 06:01:21 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 06:01:21 executing program 5: shmget(0x2, 0x2000, 0x202, &(0x7f0000ffb000/0x2000)=nil) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x2}, 0x8, 0x0) [ 533.639974][T18364] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 06:01:21 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') dup2(r1, r0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d2, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x6c00000000000000) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)=""/26, &(0x7f00000001c0)=0x1a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RLERROR(r4, &(0x7f0000000340)=ANY=[], 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 534.317550][T15684] device bridge_slave_1 left promiscuous mode [ 534.323957][T15684] bridge0: port 2(bridge_slave_1) entered disabled state [ 534.368003][T15684] device bridge_slave_0 left promiscuous mode [ 534.374461][T15684] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.077282][T15684] device hsr_slave_0 left promiscuous mode [ 535.137048][T15684] device hsr_slave_1 left promiscuous mode [ 535.183185][T15684] team0 (unregistering): Port device team_slave_1 removed [ 535.193781][T15684] team0 (unregistering): Port device team_slave_0 removed [ 535.204137][T15684] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 535.260681][T15684] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 535.329810][T15684] bond0 (unregistering): Released all slaves [ 535.435139][T18398] IPVS: ftp: loaded support on port[0] = 21 [ 535.514461][T18398] chnl_net:caif_netlink_parms(): no params data found [ 535.603812][T18398] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.612806][T18398] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.621428][T18398] device bridge_slave_0 entered promiscuous mode [ 535.631531][T18398] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.639419][T18398] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.649837][T18398] device bridge_slave_1 entered promiscuous mode [ 535.670541][T18398] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 535.682046][T18398] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 535.703624][T18398] team0: Port device team_slave_0 added [ 535.712496][T18398] team0: Port device team_slave_1 added [ 535.769573][T18398] device hsr_slave_0 entered promiscuous mode [ 535.829727][T18398] device hsr_slave_1 entered promiscuous mode [ 535.877234][T18398] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.884335][T18398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 535.891608][T18398] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.898656][T18398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 535.939728][T18398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 535.952988][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 535.961731][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.970036][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.983344][T18398] 8021q: adding VLAN 0 to HW filter on device team0 [ 535.994136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 536.003113][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.010280][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 536.028862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 536.037705][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.044736][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 536.053915][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 536.071469][T18398] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 536.082312][T18398] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 536.094697][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 536.103169][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 536.112201][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 536.120785][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 536.129298][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 536.144418][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 536.152365][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 536.163474][T18398] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 536.298613][T18409] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:24 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r4 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:24 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 06:01:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(0x0) 06:01:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 06:01:24 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='environ\x00') dup2(r1, r0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r3 = dup(r2) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x800448d2, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x6c00000000000000) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)=""/26, &(0x7f00000001c0)=0x1a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RLERROR(r4, &(0x7f0000000340)=ANY=[], 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 536.470518][ T26] audit: type=1800 audit(1576044084.141:73): pid=18414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=33 res=0 06:01:24 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 536.528097][ T26] audit: type=1800 audit(1576044084.161:74): pid=18414 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=33 res=0 06:01:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@broadcast, @local}, 0x10) 06:01:24 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 06:01:24 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r4 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:24 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x28, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept(0xffffffffffffffff, &(0x7f00000004c0)=@ipx, &(0x7f0000000440)=0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 06:01:24 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)) sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005) semop(0x0, &(0x7f0000000080)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x6}], 0x1) 06:01:24 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1}) [ 537.086993][T18458] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 1 (only 16 groups) [ 537.107127][ T26] audit: type=1800 audit(1576044084.781:75): pid=18436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=33 res=0 06:01:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:24 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r4 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:24 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r0, 0x28007d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2008000fffffffe) 06:01:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906dc8668fa366617400024601ed01000270fff8", 0x16}], 0x0, 0x0) 06:01:24 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1}) [ 537.353153][ T26] audit: type=1800 audit(1576044085.021:76): pid=18470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17153 res=0 [ 537.403598][T18471] FAT-fs (loop3): bogus sectors per cluster 70 [ 537.418153][T18472] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 1 (only 16 groups) [ 537.432644][T18471] FAT-fs (loop3): Can't find a valid FAT filesystem 06:01:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) syncfs(r2) [ 537.532824][ T26] audit: type=1800 audit(1576044085.201:77): pid=18477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=34 res=0 [ 537.554535][T18471] FAT-fs (loop3): bogus sectors per cluster 70 [ 537.560868][T18471] FAT-fs (loop3): Can't find a valid FAT filesystem [ 537.664224][ T26] audit: type=1800 audit(1576044085.241:78): pid=18477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=34 res=0 06:01:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'vlan0\x00', 0x1000000802}) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 06:01:25 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000680), 0x24, 0x0) [ 537.764501][ T26] audit: type=1800 audit(1576044085.241:79): pid=18477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=34 res=0 06:01:25 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r0, 0x28007d) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2008000fffffffe) 06:01:25 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004c40)={0x77359400}) [ 537.978699][ T26] audit: type=1800 audit(1576044085.321:80): pid=18470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17153 res=0 06:01:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 538.105798][ T26] audit: type=1800 audit(1576044085.601:81): pid=18491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=35 res=0 06:01:25 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1f, 0x0) pread64(r0, &(0x7f0000000140)=""/129, 0x81, 0x0) [ 538.195791][ T26] audit: type=1800 audit(1576044085.621:82): pid=18491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=35 res=0 [ 538.677521][ T28] device bridge_slave_1 left promiscuous mode [ 538.687411][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.747714][ T28] device bridge_slave_0 left promiscuous mode [ 538.753891][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.517411][ T28] device hsr_slave_0 left promiscuous mode [ 539.577129][ T28] device hsr_slave_1 left promiscuous mode [ 539.623399][ T28] team0 (unregistering): Port device team_slave_1 removed [ 539.634166][ T28] team0 (unregistering): Port device team_slave_0 removed [ 539.644135][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 539.680642][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 539.738205][ T28] bond0 (unregistering): Released all slaves [ 540.012341][T18526] IPVS: ftp: loaded support on port[0] = 21 [ 540.081992][T18526] chnl_net:caif_netlink_parms(): no params data found [ 540.114658][T18526] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.122909][T18526] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.132399][T18526] device bridge_slave_0 entered promiscuous mode [ 540.141205][T18526] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.149913][T18526] bridge0: port 2(bridge_slave_1) entered disabled state [ 540.159015][T18526] device bridge_slave_1 entered promiscuous mode [ 540.179663][T18526] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 540.192250][T18526] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 540.214782][T18526] team0: Port device team_slave_0 added [ 540.222579][T18526] team0: Port device team_slave_1 added [ 540.280518][T18526] device hsr_slave_0 entered promiscuous mode [ 540.328756][T18526] device hsr_slave_1 entered promiscuous mode [ 540.425065][T18526] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.432147][T18526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.439487][T18526] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.446643][T18526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.480699][T18526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 540.493394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 540.502016][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.510641][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 540.522665][T18526] 8021q: adding VLAN 0 to HW filter on device team0 [ 540.533574][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 540.543184][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.550298][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.568800][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 540.577460][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.584483][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.593718][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 540.602916][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 540.614053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 540.628220][T18526] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 540.638841][T18526] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 540.651603][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 540.660568][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 540.669035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 540.687684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 540.695153][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 540.707796][T18526] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 540.814932][T18536] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:28 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000040)={{}, 'port1\x00'}) 06:01:28 executing program 2: msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) 06:01:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) 06:01:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:28 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x69d635ea35ff0446, 0x188) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) getpriority(0x0, 0x0) ftruncate(r1, 0x8003f1) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000888affff00"/32]) 06:01:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 06:01:28 executing program 3: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x74782d441c5f7063) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000240)={0x0, &(0x7f00000001c0)=""/27, 0x1b}) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000300)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x10000, 0x0, 0x3, 0xffffffffffffffc1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r6 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0x175d900f) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x4, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 06:01:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:28 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:29 executing program 3: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x74782d441c5f7063) ioctl$MON_IOCX_GETX(r2, 0x4018920a, &(0x7f0000000240)={0x0, &(0x7f00000001c0)=""/27, 0x1b}) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000300)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x10000, 0x0, 0x3, 0xffffffffffffffc1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r6 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0x175d900f) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x4, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 06:01:29 executing program 4: [ 541.524184][ T26] kauditd_printk_skb: 9 callbacks suppressed [ 541.524202][ T26] audit: type=1800 audit(1576044089.191:92): pid=18569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=38 res=0 06:01:29 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:29 executing program 4: [ 541.662835][ T26] audit: type=1800 audit(1576044089.231:93): pid=18569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=38 res=0 [ 541.804872][ T26] audit: type=1800 audit(1576044089.291:94): pid=18572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=39 res=0 06:01:29 executing program 2: 06:01:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:29 executing program 3: [ 542.049528][ T26] audit: type=1800 audit(1576044089.721:95): pid=18590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=40 res=0 06:01:29 executing program 4: 06:01:29 executing program 2: [ 542.178909][ T26] audit: type=1800 audit(1576044089.721:96): pid=18590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=40 res=0 06:01:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:30 executing program 3: [ 542.405669][ T26] audit: type=1800 audit(1576044090.071:97): pid=18581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=39 res=0 [ 542.546476][ T26] audit: type=1800 audit(1576044090.211:98): pid=18603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=39 res=0 [ 542.622876][ T26] audit: type=1804 audit(1576044090.241:99): pid=18600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir970974673/syzkaller.DUysed/381/file0/file0" dev="loop5" ino=39 res=1 06:01:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:30 executing program 4: 06:01:30 executing program 2: [ 542.751626][ T26] audit: type=1800 audit(1576044090.261:100): pid=18610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=41 res=0 [ 543.029638][ T26] audit: type=1800 audit(1576044090.701:101): pid=18621 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=42 res=0 [ 543.338292][T18626] FAT-fs (loop5): error, fat_free_clusters: deleting FAT entry beyond EOF [ 543.346933][T18626] FAT-fs (loop5): Filesystem has been set read-only [ 543.350743][ T7] device bridge_slave_1 left promiscuous mode [ 543.360756][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.417738][ T7] device bridge_slave_0 left promiscuous mode [ 543.423882][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.147363][ T7] device hsr_slave_0 left promiscuous mode [ 544.197045][ T7] device hsr_slave_1 left promiscuous mode [ 544.253650][ T7] team0 (unregistering): Port device team_slave_1 removed [ 544.263729][ T7] team0 (unregistering): Port device team_slave_0 removed [ 544.274195][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 544.320216][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 544.386054][ T7] bond0 (unregistering): Released all slaves [ 544.463823][T18630] IPVS: ftp: loaded support on port[0] = 21 [ 544.514541][T18630] chnl_net:caif_netlink_parms(): no params data found [ 544.592257][T18630] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.599371][T18630] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.607220][T18630] device bridge_slave_0 entered promiscuous mode [ 544.614958][T18630] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.624618][T18630] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.632692][T18630] device bridge_slave_1 entered promiscuous mode [ 544.653117][T18630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 544.667281][T18630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 544.688808][T18630] team0: Port device team_slave_0 added [ 544.695739][T18630] team0: Port device team_slave_1 added [ 544.799348][T18630] device hsr_slave_0 entered promiscuous mode [ 544.847423][T18630] device hsr_slave_1 entered promiscuous mode [ 544.945863][T18630] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.952998][T18630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 544.960393][T18630] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.967425][T18630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.997811][T18630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 545.009892][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 545.019466][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.027642][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.040664][T18630] 8021q: adding VLAN 0 to HW filter on device team0 [ 545.051788][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 545.060670][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.067784][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 545.088556][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.096837][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.103980][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 545.112872][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 545.121903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 545.136072][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 545.144293][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.152522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 545.161940][T18630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 545.175852][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 545.183471][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 545.194668][T18630] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:33 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:33 executing program 3: 06:01:33 executing program 4: [ 545.322137][T18639] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:33 executing program 2: 06:01:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:33 executing program 5: 06:01:33 executing program 3: 06:01:33 executing program 5: 06:01:33 executing program 2: 06:01:33 executing program 4: 06:01:33 executing program 4: 06:01:33 executing program 2: 06:01:33 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:33 executing program 3: 06:01:33 executing program 5: 06:01:33 executing program 4: 06:01:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:33 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:33 executing program 4: 06:01:33 executing program 2: 06:01:33 executing program 3: 06:01:33 executing program 5: 06:01:34 executing program 4: 06:01:34 executing program 2: 06:01:34 executing program 5: 06:01:34 executing program 3: 06:01:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, 0x7}, 0x20) 06:01:34 executing program 5: syz_emit_ethernet(0x5eb, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) [ 547.019600][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 547.019614][ T26] audit: type=1800 audit(1576044094.691:107): pid=18684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=44 res=0 06:01:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 547.539909][ T7] device bridge_slave_1 left promiscuous mode [ 547.546245][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.627772][ T7] device bridge_slave_0 left promiscuous mode [ 547.634068][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.307466][ T7] device hsr_slave_0 left promiscuous mode [ 548.377033][ T7] device hsr_slave_1 left promiscuous mode [ 548.433162][ T7] team0 (unregistering): Port device team_slave_1 removed [ 548.443347][ T7] team0 (unregistering): Port device team_slave_0 removed [ 548.453384][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 548.500340][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 548.563630][ T7] bond0 (unregistering): Released all slaves [ 548.703360][T18708] IPVS: ftp: loaded support on port[0] = 21 [ 548.754777][T18708] chnl_net:caif_netlink_parms(): no params data found [ 548.781482][T18708] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.788755][T18708] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.796715][T18708] device bridge_slave_0 entered promiscuous mode [ 548.804183][T18708] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.813064][T18708] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.821178][T18708] device bridge_slave_1 entered promiscuous mode [ 548.881227][T18708] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 548.892699][T18708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 548.914393][T18708] team0: Port device team_slave_0 added [ 548.923564][T18708] team0: Port device team_slave_1 added [ 548.981420][T18708] device hsr_slave_0 entered promiscuous mode [ 549.107435][T18708] device hsr_slave_1 entered promiscuous mode [ 549.155366][T18708] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.162447][T18708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.169801][T18708] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.176822][T18708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.219557][T18708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 549.232762][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 549.240847][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.249194][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.261974][T18708] 8021q: adding VLAN 0 to HW filter on device team0 [ 549.272859][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 549.281768][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.288839][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.309074][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 549.317750][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.324767][ T7675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.334281][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 549.343716][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 549.357864][T18708] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 549.368698][T18708] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 549.381406][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 549.390027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 549.398953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 549.415861][T18708] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 549.424117][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 549.432007][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 549.439985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 549.542996][T18720] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:37 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:37 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006"], 0x3}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x2d4) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 06:01:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='timers\x00') pread64(r0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001280)='cpuacct.usage_all\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:01:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60210}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$nl_route(0x10, 0x3, 0x0) 06:01:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000005ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:01:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:37 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="19", 0x1, 0x8000, 0x0, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000001400)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000180)="a7", 0x1}], 0x1}}], 0x1, 0x0) 06:01:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x37c6) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0}], 0x1, 0x0) 06:01:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 550.901245][T18731] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.908477][T18731] bridge0: port 1(bridge_slave_0) entered disabled state 06:01:39 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7c}, [@ldst={0x3fd}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffa2}, 0x48) 06:01:39 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:39 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x3}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@dellink={0x20, 0x11, 0x92a397f57307af13, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 06:01:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x1, 0x0, 0x4}, 0xfd94) 06:01:40 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x10) 06:01:40 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 552.425595][ T26] audit: type=1800 audit(1576044100.091:108): pid=18781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17771 res=0 [ 552.509091][ T26] audit: type=1800 audit(1576044100.131:109): pid=18785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17771 res=0 06:01:40 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 06:01:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x803, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a280930206000100000001020b00000a000f003502280014000000090005407f0180000022de1338d50400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d41d", 0x55}], 0x1}, 0x0) [ 552.570361][ T26] audit: type=1800 audit(1576044100.201:110): pid=18785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17771 res=0 06:01:40 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:40 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r1 = dup(r0) write$cgroup_pid(r1, &(0x7f0000000240)=0xffffffffffffffff, 0x2cd) 06:01:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") [ 552.860347][ T26] audit: type=1800 audit(1576044100.531:111): pid=18803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17765 res=0 [ 552.937749][ T26] audit: type=1800 audit(1576044100.561:112): pid=18810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17765 res=0 [ 552.994025][T18808] netlink: 'syz-executor.2': attribute type 15 has an invalid length. [ 553.012669][T18808] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 553.016909][ T26] audit: type=1800 audit(1576044100.641:113): pid=18810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17765 res=0 [ 553.041867][T18808] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.2'. 06:01:40 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:40 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 06:01:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000800000084000000000000009500000000000400"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 06:01:41 executing program 2: [ 553.305178][ T26] audit: type=1800 audit(1576044100.971:114): pid=18823 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17741 res=0 [ 553.387916][ T26] audit: type=1800 audit(1576044101.001:115): pid=18825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17741 res=0 06:01:41 executing program 3: [ 553.483522][ T26] audit: type=1800 audit(1576044101.081:116): pid=18825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17741 res=0 06:01:41 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 553.794752][ T26] audit: type=1800 audit(1576044101.461:117): pid=18835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17633 res=0 [ 553.987502][ T670] device bridge_slave_1 left promiscuous mode [ 553.993700][ T670] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.067904][ T670] device bridge_slave_0 left promiscuous mode [ 554.074080][ T670] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.777362][ T670] device hsr_slave_0 left promiscuous mode [ 554.837083][ T670] device hsr_slave_1 left promiscuous mode [ 554.893721][ T670] team0 (unregistering): Port device team_slave_1 removed [ 554.904054][ T670] team0 (unregistering): Port device team_slave_0 removed [ 554.914073][ T670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 554.950698][ T670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 555.028218][ T670] bond0 (unregistering): Released all slaves [ 555.133815][T18848] IPVS: ftp: loaded support on port[0] = 21 [ 555.187317][T18848] chnl_net:caif_netlink_parms(): no params data found [ 555.214260][T18848] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.221354][T18848] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.229390][T18848] device bridge_slave_0 entered promiscuous mode [ 555.236690][T18848] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.243813][T18848] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.251880][T18848] device bridge_slave_1 entered promiscuous mode [ 555.270183][T18848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 555.328723][T18848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 555.348795][T18848] team0: Port device team_slave_0 added [ 555.355757][T18848] team0: Port device team_slave_1 added [ 555.452003][T18848] device hsr_slave_0 entered promiscuous mode [ 555.517443][T18848] device hsr_slave_1 entered promiscuous mode [ 555.597930][T18848] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.605069][T18848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.612370][T18848] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.619420][T18848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.658821][T18848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 555.675202][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 555.683832][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.691821][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.704648][T18848] 8021q: adding VLAN 0 to HW filter on device team0 [ 555.715943][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 555.724744][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.732171][ T7675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.749327][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 555.758282][ T3512] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.765362][ T3512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.774648][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 555.791730][T18848] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 555.802381][T18848] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 555.815690][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 555.824404][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 555.833865][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 555.843160][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 555.851735][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 555.866216][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 555.873814][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 555.885010][T18848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 556.031090][T18858] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:43 executing program 5: 06:01:43 executing program 2: 06:01:43 executing program 3: 06:01:43 executing program 4: 06:01:43 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:43 executing program 5: 06:01:43 executing program 4: 06:01:43 executing program 3: 06:01:44 executing program 2: [ 556.376646][T18872] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:44 executing program 5: 06:01:44 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:44 executing program 4: 06:01:44 executing program 3: 06:01:44 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:44 executing program 2: 06:01:44 executing program 4: 06:01:44 executing program 5: [ 556.841285][T18899] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:44 executing program 3: 06:01:44 executing program 2: 06:01:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:44 executing program 5: 06:01:44 executing program 4: 06:01:44 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:44 executing program 2: 06:01:44 executing program 3: 06:01:44 executing program 5: 06:01:45 executing program 4: 06:01:45 executing program 2: 06:01:45 executing program 3: 06:01:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:45 executing program 5: 06:01:45 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:45 executing program 4: 06:01:45 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:45 executing program 2: 06:01:45 executing program 3: [ 557.757510][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 557.757526][ T26] audit: type=1800 audit(1576044105.431:129): pid=18940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16491 res=0 06:01:45 executing program 5: [ 557.929286][ T26] audit: type=1800 audit(1576044105.461:130): pid=18940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16491 res=0 06:01:45 executing program 2: 06:01:45 executing program 3: 06:01:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', 0x0, 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 558.086984][ T26] audit: type=1800 audit(1576044105.521:131): pid=18945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16491 res=0 06:01:45 executing program 4: 06:01:45 executing program 5: 06:01:46 executing program 2: [ 558.401993][ T26] audit: type=1800 audit(1576044106.071:132): pid=18965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17809 res=0 06:01:46 executing program 3: 06:01:46 executing program 4: [ 558.502972][ T26] audit: type=1800 audit(1576044106.081:133): pid=18965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17809 res=0 [ 558.707007][ T26] audit: type=1800 audit(1576044106.171:134): pid=18965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17809 res=0 [ 559.287581][ T28] device bridge_slave_1 left promiscuous mode [ 559.293818][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.347766][ T28] device bridge_slave_0 left promiscuous mode [ 559.354047][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.017460][ T28] device hsr_slave_0 left promiscuous mode [ 560.077130][ T28] device hsr_slave_1 left promiscuous mode [ 560.144275][ T28] team0 (unregistering): Port device team_slave_1 removed [ 560.155630][ T28] team0 (unregistering): Port device team_slave_0 removed [ 560.166897][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 560.210482][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 560.286760][ T28] bond0 (unregistering): Released all slaves [ 560.413576][T18979] IPVS: ftp: loaded support on port[0] = 21 [ 560.462910][T18979] chnl_net:caif_netlink_parms(): no params data found [ 560.488488][T18979] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.495628][T18979] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.503455][T18979] device bridge_slave_0 entered promiscuous mode [ 560.511061][T18979] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.518199][T18979] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.526003][T18979] device bridge_slave_1 entered promiscuous mode [ 560.589233][T18979] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 560.600049][T18979] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 560.619623][T18979] team0: Port device team_slave_0 added [ 560.626422][T18979] team0: Port device team_slave_1 added [ 560.771762][T18979] device hsr_slave_0 entered promiscuous mode [ 560.849443][T18979] device hsr_slave_1 entered promiscuous mode [ 560.917007][T18979] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.924066][T18979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.931490][T18979] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.938524][T18979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 560.973089][T18979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 560.984942][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 560.993219][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 561.001384][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 561.015029][T18979] 8021q: adding VLAN 0 to HW filter on device team0 [ 561.025527][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 561.034174][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.041241][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 561.059658][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 561.068369][T18710] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.075522][T18710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 561.084642][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 561.093613][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 561.104071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 561.115880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 561.129957][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 561.140062][T18979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 561.155290][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 561.162992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 561.173423][T18979] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 561.324356][T18989] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:49 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:49 executing program 5: 06:01:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:49 executing program 2: 06:01:49 executing program 4: 06:01:49 executing program 3: 06:01:49 executing program 3: [ 561.500597][T18995] FAT-fs (loop0): bogus number of reserved sectors 06:01:49 executing program 2: 06:01:49 executing program 4: [ 561.546879][T18995] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:49 executing program 5: 06:01:49 executing program 3: 06:01:49 executing program 4: 06:01:49 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x0) 06:01:49 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x13, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0xffffffffffffffd5}}}, 0x24}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000140)={0x0, 'syzkaller1\x00'}) 06:01:49 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x2000000000000204, &(0x7f0000000180)=ANY=[@ANYBLOB="000100000000000000000000000200000020000000000034709c8becc615bc0e80948f9b3c100873247e7e06"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x481, &(0x7f00000001c0)=""/195}, 0x48) 06:01:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001ac0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8001) 06:01:49 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 06:01:49 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 562.131422][T19024] FAT-fs (loop0): bogus number of reserved sectors [ 562.162564][T19024] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) [ 562.254068][ T26] audit: type=1800 audit(1576044109.911:135): pid=19034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17828 res=0 [ 562.325596][ T26] audit: type=1800 audit(1576044109.941:136): pid=19024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17828 res=0 [ 562.413031][ T26] audit: type=1800 audit(1576044110.031:137): pid=19034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17828 res=0 [ 562.440105][ T26] audit: type=1326 audit(1576044110.111:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19039 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 06:01:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6900) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001ac0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8001) 06:01:50 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x94) r0 = memfd_create(&(0x7f0000000080)='wlan1\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000200)='coredump_filter\x00*\x0e\xc3=.\x13\xcbx\x95*\xeeX\x9fcy\xa49\xf6\x8f\x82^\x19\xa9\xcd+\b\x9f\xc6,\xa0\xf0\xff\x9dO\x06\xc9\x15\xda\xa4\x7fh\xd4\xe8C\xdeKUrR\xf4\x9c\x87\xee\xd2\xfb\xdfs\xd0G\x91\x02\x15Z\xa8\x1ad\xadY\x13\x14mg\xc9\x00\x16\xa4\xc48\x06u\x1e:\xd4Y?\xd8P\xe8reP\xffv\xd6\x12\x85N1\n\f\xb0\x1e\xe7\xffD\x1aS\xbf0\x80\xff\xff7V\xcc5\x96W\x14J\xe2\x93\xe3\xc6A7\xd8\xec\xb2m\xf5\x16-\x1b\xbd\x11\x1aYg\xe0\xa7\xd19\a') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)) [ 562.599856][T19046] FAT-fs (loop0): bogus number of reserved sectors [ 562.623630][T19046] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) open(&(0x7f00000002c0)='./file0\x00', 0x109040, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 562.792810][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 562.792826][ T26] audit: type=1800 audit(1576044110.461:141): pid=19052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17821 res=0 06:01:50 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) open(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001500192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000700010004081000418e00000004fcff", 0xfed1}], 0x1) readahead(r2, 0x9, 0x4) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0x1, @local, 0xccd}, {0xa, 0x4e23, 0x81, @remote, 0x1}, 0x1fb, [0x9, 0x9, 0x1f, 0x0, 0x0, 0x0, 0x5, 0x8]}, 0x5c) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}, {0x2, 0x4, @broadcast}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) readv(r3, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000002140)=""/252, 0xfc}, {&(0x7f0000002240)=""/89, 0x59}, {&(0x7f00000022c0)=""/161, 0xa1}, {&(0x7f0000002380)=""/141, 0x8d}, {&(0x7f0000002440)=""/60, 0x3c}, {&(0x7f0000002480)=""/252, 0xfc}, {&(0x7f0000002580)=""/24, 0x18}], 0x9) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) setsockopt$IP_VS_SO_SET_TIMEOUT(r6, 0x0, 0x48a, &(0x7f0000000100), 0xc) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000026c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000700200002001000020010000200100000000000000000000d8010000d8010000d8010000d8010000d801000003000000", @ANYPTR=&(0x7f0000002680)=ANY=[@ANYBLOB="000000000000000000000a00000000002000009200000010000000000000002300"/48], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c00020010000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000040000000000000060005345540000000000000000000000000000000000000000000000000000000008000007000000040000005c1d0000020000000004000000000000058000006600000000080000d600000004000000000800000100008002000000b334000000000000ac1414aa00000000ffffffff76657468315f746f5f62726964676500626373683000000000000000000000000000000000000000000000007f0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000002e00022000000000000000000000000000009800b8000000000000000000000000000000000000000000000000002000545241434500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x2d0) socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x201a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000002a80)='hwsim0\x00', 0x10) dup2(r0, r7) request_key(&(0x7f00000029c0)='trusted\x00', &(0x7f0000002a00)={'syz', 0x1}, &(0x7f0000002a40)=']em0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 06:01:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 06:01:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 562.988660][ T26] audit: type=1326 audit(1576044110.661:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19060 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 563.184964][T19072] FAT-fs (loop0): bogus number of reserved sectors [ 563.220855][ T26] audit: type=1326 audit(1576044110.891:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19039 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 563.248692][T19072] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 563.292926][ T26] audit: type=1800 audit(1576044110.921:144): pid=19076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17121 res=0 06:01:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_flags=0x4000}) [ 563.352429][ T26] audit: type=1800 audit(1576044110.931:145): pid=19076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17121 res=0 [ 563.377548][ T26] audit: type=1800 audit(1576044111.001:146): pid=19079 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17121 res=0 06:01:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @remote}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) [ 563.763030][ T26] audit: type=1326 audit(1576044111.431:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19060 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 563.937618][ T7877] device bridge_slave_1 left promiscuous mode [ 563.969507][ T7877] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.037771][ T7877] device bridge_slave_0 left promiscuous mode [ 564.044038][ T7877] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.757290][ T7877] device hsr_slave_0 left promiscuous mode [ 564.847168][ T7877] device hsr_slave_1 left promiscuous mode [ 564.913648][ T7877] team0 (unregistering): Port device team_slave_1 removed [ 564.924472][ T7877] team0 (unregistering): Port device team_slave_0 removed [ 564.934904][ T7877] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 564.993359][ T7877] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 565.066333][ T7877] bond0 (unregistering): Released all slaves [ 565.173408][T19104] IPVS: ftp: loaded support on port[0] = 21 [ 565.223873][T19104] chnl_net:caif_netlink_parms(): no params data found [ 565.249685][T19104] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.256862][T19104] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.264704][T19104] device bridge_slave_0 entered promiscuous mode [ 565.272336][T19104] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.279515][T19104] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.287566][T19104] device bridge_slave_1 entered promiscuous mode [ 565.304740][T19104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 565.401613][T19104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 565.421234][T19104] team0: Port device team_slave_0 added [ 565.430494][T19104] team0: Port device team_slave_1 added [ 565.499408][T19104] device hsr_slave_0 entered promiscuous mode [ 565.537297][T19104] device hsr_slave_1 entered promiscuous mode [ 565.594954][T19104] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.602113][T19104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.609433][T19104] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.616448][T19104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.655077][T19104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 565.671175][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 565.682839][ T3512] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.691108][ T3512] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.707495][T19104] 8021q: adding VLAN 0 to HW filter on device team0 [ 565.721213][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 565.730061][T18710] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.737099][T18710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.758274][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 565.770650][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.777692][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.786626][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 565.803741][T19104] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 565.814279][T19104] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 565.826565][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 565.835157][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 565.843833][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 565.852593][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 565.860980][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 565.875954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 565.883505][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 565.893961][T19104] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 566.013511][T19114] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:53 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:53 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 06:01:53 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:01:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) getrusage(0x0, &(0x7f0000000080)) 06:01:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_map={0xc7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_flags=0x4000}) [ 566.128748][ T26] audit: type=1326 audit(1576044113.801:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19115 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 566.163423][ T26] audit: type=1326 audit(1576044113.831:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19119 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 566.193348][T19124] FAT-fs (loop0): bogus number of reserved sectors [ 566.212431][T19124] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:53 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f00003b6ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 566.266506][ T26] audit: type=1800 audit(1576044113.931:150): pid=19129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17569 res=0 06:01:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) open(&(0x7f00000002c0)='./file0\x00', 0x109040, 0x0) utimes(&(0x7f0000000080)='./file0\x00', 0x0) 06:01:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:54 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r1, r4, 0x0, 0x8400fffffffa) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 566.519730][T19140] FAT-fs (loop0): bogus number of reserved sectors [ 566.526554][T19140] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:54 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:54 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)) [ 566.799700][T19152] FAT-fs (loop0): bogus number of reserved sectors [ 566.806289][T19152] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/105) 06:01:54 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x1800, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000a00000/0x600000)=nil, 0x1e76b3f7e83c4d66) 06:01:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:01:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20008088) r2 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r4 = gettid() ptrace$setopts(0xffffffffffffffff, r4, 0x0, 0x0) getpgrp(0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0xc0) r5 = open(&(0x7f0000000200)='./bus\x00', 0x4000000000141042, 0x0) write$evdev(r5, &(0x7f00000000c0), 0xffffffed) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r6, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, {0x2, 0x0, @empty}, {0x2, 0x4e23, @local}, 0x2e, 0x0, 0x0, 0x0, 0xd71e, &(0x7f0000000140)='nr0\x00', 0x0, 0x0, 0x3}) fdatasync(r3) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000680)) fchown(0xffffffffffffffff, r7, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 567.391986][T19175] FAT-fs (loop0): bogus number of reserved sectors 06:01:55 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x208200) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$P9_RSTAT(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="8c"], 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 06:01:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 567.485638][T19175] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 06:01:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 568.001211][T19203] FAT-fs (loop0): bogus number of reserved sectors [ 568.008343][ T26] kauditd_printk_skb: 16 callbacks suppressed [ 568.008361][ T26] audit: type=1326 audit(1576044115.681:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19163 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 568.023749][T19203] FAT-fs (loop0): Can't find a valid FAT filesystem [ 568.177115][ T26] audit: type=1800 audit(1576044115.821:168): pid=19210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17057 res=0 [ 568.277553][ T670] device bridge_slave_1 left promiscuous mode [ 568.284112][ T670] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.312027][ T26] audit: type=1800 audit(1576044115.841:169): pid=19210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17057 res=0 [ 568.358118][ T670] device bridge_slave_0 left promiscuous mode [ 568.364378][ T670] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.379612][ T26] audit: type=1800 audit(1576044115.911:170): pid=19211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17057 res=0 [ 569.117227][ T670] device hsr_slave_0 left promiscuous mode [ 569.167087][ T670] device hsr_slave_1 left promiscuous mode [ 569.233831][ T670] team0 (unregistering): Port device team_slave_1 removed [ 569.244179][ T670] team0 (unregistering): Port device team_slave_0 removed [ 569.254854][ T670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 569.310530][ T670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 569.367324][ T670] bond0 (unregistering): Released all slaves [ 569.613636][T19217] IPVS: ftp: loaded support on port[0] = 21 [ 569.686286][T19217] chnl_net:caif_netlink_parms(): no params data found [ 569.718963][T19217] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.726044][T19217] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.736408][T19217] device bridge_slave_0 entered promiscuous mode [ 569.745099][T19217] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.754329][T19217] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.763552][T19217] device bridge_slave_1 entered promiscuous mode [ 569.784553][T19217] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 569.799342][T19217] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 569.821385][T19217] team0: Port device team_slave_0 added [ 569.830351][T19217] team0: Port device team_slave_1 added [ 569.889228][T19217] device hsr_slave_0 entered promiscuous mode [ 569.929969][T19217] device hsr_slave_1 entered promiscuous mode [ 569.984997][T19217] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.992114][T19217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.999418][T19217] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.006500][T19217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 570.038084][T19217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 570.050799][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 570.060000][ T7831] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.067887][ T7831] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.080645][T19217] 8021q: adding VLAN 0 to HW filter on device team0 [ 570.092025][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 570.100949][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.108073][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 570.128605][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 570.137440][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 570.144473][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 570.153324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 570.162166][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 570.170922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 570.184300][T19217] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 570.194927][T19217] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 570.206681][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 570.215867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 570.224645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 570.239132][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 570.246544][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 570.256620][T19217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 570.373649][T19227] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:01:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:01:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_get$uid(0x1, 0x0) 06:01:58 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$eventfd(r1, &(0x7f00000001c0), 0xffffff7f) open(&(0x7f0000000040)='./bus\x00', 0x10d000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002200), 0x1000) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x16d2) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 06:01:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:01:58 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)) 06:01:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 570.539369][T19235] FAT-fs (loop0): bogus number of reserved sectors [ 570.552044][T19235] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:58 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) readv(r0, &(0x7f0000000300), 0x0) [ 570.579375][ T26] audit: type=1800 audit(1576044118.251:171): pid=19235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17845 res=0 06:01:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:01:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rt_sigqueueinfo(0x0, 0x0, 0x0) [ 570.629754][ T26] audit: type=1800 audit(1576044118.271:172): pid=19235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17845 res=0 [ 570.765165][ T26] audit: type=1800 audit(1576044118.341:173): pid=19243 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17845 res=0 06:01:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 570.810623][ T26] audit: type=1326 audit(1576044118.471:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19247 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 06:01:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 570.900742][T19254] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 06:01:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:01:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 570.957056][T19258] FAT-fs (loop0): bogus number of reserved sectors [ 570.963587][T19258] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 571.009607][ T26] audit: type=1800 audit(1576044118.681:175): pid=19264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17777 res=0 [ 571.032398][ T26] audit: type=1800 audit(1576044118.681:176): pid=19264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17777 res=0 06:01:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:58 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 571.382081][T19276] FAT-fs (loop0): bogus number of reserved sectors [ 571.406083][T19276] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:01:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) munlockall() [ 571.589633][T19261] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 06:01:59 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) signalfd(0xffffffffffffffff, 0x0, 0x0) 06:01:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:01:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 571.974656][T19300] FAT-fs (loop0): bogus number of reserved sectors [ 571.998378][T19300] FAT-fs (loop0): Can't find a valid FAT filesystem 06:01:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:01:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:00 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 572.433762][T19316] FAT-fs (loop0): bogus number of reserved sectors [ 572.482920][T19316] FAT-fs (loop0): Can't find a valid FAT filesystem [ 572.727513][ T670] device bridge_slave_1 left promiscuous mode [ 572.733739][ T670] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.848583][ T670] device bridge_slave_0 left promiscuous mode [ 572.854786][ T670] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.547475][ T670] device hsr_slave_0 left promiscuous mode [ 573.587120][ T670] device hsr_slave_1 left promiscuous mode [ 573.633210][ T670] team0 (unregistering): Port device team_slave_1 removed [ 573.643681][ T670] team0 (unregistering): Port device team_slave_0 removed [ 573.653608][ T670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 573.710281][ T670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 573.786257][ T670] bond0 (unregistering): Released all slaves [ 573.946265][T19343] IPVS: ftp: loaded support on port[0] = 21 [ 573.994954][T19343] chnl_net:caif_netlink_parms(): no params data found [ 574.069177][T19343] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.076250][T19343] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.084974][T19343] device bridge_slave_0 entered promiscuous mode [ 574.094691][T19343] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.102348][T19343] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.113586][T19343] device bridge_slave_1 entered promiscuous mode [ 574.134432][T19343] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 574.146691][T19343] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 574.169684][T19343] team0: Port device team_slave_0 added [ 574.176707][T19343] team0: Port device team_slave_1 added [ 574.241747][T19343] device hsr_slave_0 entered promiscuous mode [ 574.289845][T19343] device hsr_slave_1 entered promiscuous mode [ 574.357818][T19343] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.364912][T19343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 574.372212][T19343] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.379262][T19343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 574.419811][T19343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 574.435417][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 574.445139][T18710] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.453827][T18710] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.466337][T19343] 8021q: adding VLAN 0 to HW filter on device team0 [ 574.477182][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 574.485573][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.492630][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 574.504859][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 574.515069][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.522102][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 574.541629][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 574.558861][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 574.567276][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 574.575913][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 574.587559][T19343] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 574.599049][T19343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 574.610985][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 574.623272][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 574.630791][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 574.641701][T19343] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 574.775426][T19353] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:02 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000140)=[{0x0, 0xfffd}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x1ff]) 06:02:02 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000788ffc), 0x4) 06:02:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x16d2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x40002}) 06:02:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 574.927703][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 574.927757][ T26] audit: type=1326 audit(1576044122.601:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19356 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 575.031252][T19365] FAT-fs (loop0): bogus number of reserved sectors [ 575.065377][ T26] audit: type=1800 audit(1576044122.731:195): pid=19374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17864 res=0 [ 575.066516][T19365] FAT-fs (loop0): Can't find a valid FAT filesystem [ 575.118781][ T26] audit: type=1800 audit(1576044122.781:196): pid=19374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17864 res=0 06:02:02 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 575.205066][ T26] audit: type=1800 audit(1576044122.871:197): pid=19365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17864 res=0 06:02:02 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:03 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) [ 575.557077][T19394] FAT-fs (loop0): bogus number of reserved sectors [ 575.565088][T19394] FAT-fs (loop0): Can't find a valid FAT filesystem [ 575.601744][ T26] audit: type=1800 audit(1576044123.271:198): pid=19400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17878 res=0 [ 575.635774][ T26] audit: type=1800 audit(1576044123.291:199): pid=19400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17878 res=0 [ 575.702385][ T26] audit: type=1800 audit(1576044123.371:200): pid=19400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17878 res=0 06:02:03 executing program 5: socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) [ 575.796362][ T26] audit: type=1326 audit(1576044123.401:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19356 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d68a code=0xffff0000 [ 576.357539][ T7] device bridge_slave_1 left promiscuous mode [ 576.363768][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.417723][ T7] device bridge_slave_0 left promiscuous mode [ 576.423975][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 577.097435][ T7] device hsr_slave_0 left promiscuous mode [ 577.137158][ T7] device hsr_slave_1 left promiscuous mode [ 577.183920][ T7] team0 (unregistering): Port device team_slave_1 removed [ 577.194230][ T7] team0 (unregistering): Port device team_slave_0 removed [ 577.204553][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 577.230482][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 577.296328][ T7] bond0 (unregistering): Released all slaves 06:02:05 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:05 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:05 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)) socket$inet6(0xa, 0x3, 0x6b) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) r1 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000004ec0)=[{0x0, 0x0, 0x0}], 0x1, 0x200640c0) 06:02:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:05 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001840)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000240)={0x1d, r2}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x1d, 0x0, 0xfffffffffffffffc}, 0x18, &(0x7f0000000080)={&(0x7f0000000180)='4', 0x6fffff9}}, 0x0) [ 578.015241][T19423] vcan0: tx drop: invalid da for name 0xfffffffffffffffc [ 578.063515][T19430] vcan0: tx drop: invalid da for name 0xfffffffffffffffc [ 578.089092][T19427] FAT-fs (loop0): bogus number of reserved sectors 06:02:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 578.110647][T19427] FAT-fs (loop0): Can't find a valid FAT filesystem 06:02:05 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00@z\x18Sb\xb0\xee\xb0< f\xb7\xc3\xfd0U\xedWM\xff\x7f\x88\xa2\xf4V~\x81U\xea\xfb\xcf\xef\xb3\xf8\xf2\xb5\x98\xe5\x93~z\xa3\x17\xb2\xb0#]Z\xe4$\x8b\xcb\xc5F\x92\x11\xf0\x1e-\x80\xb0\xef\x84\xe3[\x05\xb5\xb9\x9c\xa7@\x91\xbbq0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x40086607, 0x0) recvmsg(r1, &(0x7f0000005700)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 06:02:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 582.435217][ T26] audit: type=1800 audit(1576044130.061:216): pid=19565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17909 res=0 06:02:10 executing program 5: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x8, &(0x7f00000000c0), 0x10) 06:02:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:10 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 582.763009][T19586] FAT-fs (loop0): invalid media value (0x00) [ 582.777082][T19586] FAT-fs (loop0): Can't find a valid FAT filesystem 06:02:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) [ 582.880314][ T26] audit: type=1800 audit(1576044130.551:217): pid=19586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17897 res=0 [ 583.277558][ T7] device bridge_slave_1 left promiscuous mode [ 583.284880][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.337723][ T7] device bridge_slave_0 left promiscuous mode [ 583.343899][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.997514][ T7] device hsr_slave_0 left promiscuous mode [ 584.037131][ T7] device hsr_slave_1 left promiscuous mode [ 584.112812][ T7] team0 (unregistering): Port device team_slave_1 removed [ 584.123021][ T7] team0 (unregistering): Port device team_slave_0 removed [ 584.133106][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 584.170845][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 584.246805][ T7] bond0 (unregistering): Released all slaves [ 584.397403][T19604] IPVS: ftp: loaded support on port[0] = 21 [ 584.490096][T19604] chnl_net:caif_netlink_parms(): no params data found [ 584.520963][T19604] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.530206][T19604] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.538700][T19604] device bridge_slave_0 entered promiscuous mode [ 584.546587][T19604] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.555739][T19604] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.564342][T19604] device bridge_slave_1 entered promiscuous mode [ 584.584728][T19604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 584.598356][T19604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 584.621888][T19604] team0: Port device team_slave_0 added [ 584.631842][T19604] team0: Port device team_slave_1 added [ 584.691314][T19604] device hsr_slave_0 entered promiscuous mode [ 584.749259][T19604] device hsr_slave_1 entered promiscuous mode [ 584.814807][T19604] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.821969][T19604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.829246][T19604] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.836356][T19604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.871871][T19604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 584.884587][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.895509][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.916684][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.950412][T19604] 8021q: adding VLAN 0 to HW filter on device team0 [ 584.961428][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.976671][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.983760][ T7675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.995231][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 585.005698][ T7831] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.012749][ T7831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.029962][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 585.038888][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 585.055601][T19604] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 585.066585][T19604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 585.079214][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 585.088779][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 585.097438][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 585.105720][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 585.121631][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 585.131911][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 585.141094][T19604] 8021q: adding VLAN 0 to HW filter on device batadv0 06:02:12 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15566701800100000000006722b460"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 06:02:12 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 06:02:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:12 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 585.273062][T19615] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 585.432262][T19621] FAT-fs (loop0): invalid media value (0x00) [ 585.467079][T19621] FAT-fs (loop0): Can't find a valid FAT filesystem 06:02:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15566701800100000000006722b460"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 06:02:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() tkill(0x0, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:13 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000480)="ab22561e2475aaf10584a67a1d176bd8b121c7fde7b5e7fe6f6ca21c6ebdff899448bf73ff4363e3f4e0b9e02b7dd47048000b9098e2c6f13bf170e527d84558cc3f776f766cd9102660baf63f34be39c783e8f9d7700ab3f94c2852ccdb47c508dca5eb64fdc60a7fb952d32aa046c5947b31e96aaae0db4b362692995d205302", 0x81}, {&(0x7f0000000080)="50c620cc9382abfd31ea7d4bd7d2e48a539c6588ad178b67c21d8130e292767bf8ddf66186750b99d9", 0x29}], 0x2, 0x2) read$eventfd(r1, 0x0, 0x0) fallocate(r0, 0x800000000000003, 0xfa9, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000002c0)=""/106) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x800fe) sendfile(r5, r6, 0x0, 0x8000fffffffe) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 06:02:13 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:13 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() tkill(0x0, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e15566701800100000000006722b460"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 585.970873][T19662] FAT-fs (loop0): invalid media value (0x00) [ 585.997965][T19664] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:02:13 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 586.047044][T19662] FAT-fs (loop0): Can't find a valid FAT filesystem 06:02:13 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() tkill(0x0, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:14 executing program 5: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) shutdown(r1, 0x0) [ 586.424998][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 586.425013][ T26] audit: type=1800 audit(1576044134.091:226): pid=19664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17934 res=0 06:02:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local, {[@cipso={0x86, 0x6}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 06:02:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() tkill(r0, 0x1000000000013) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:02:14 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 586.650662][T19698] FAT-fs (loop0): invalid media value (0x00) [ 586.737087][T19698] FAT-fs (loop0): Can't find a valid FAT filesystem 06:02:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() tkill(r0, 0x1000000000013) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:02:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) 06:02:14 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 587.100489][T19730] FAT-fs (loop0): invalid media value (0x00) [ 587.133754][T19730] FAT-fs (loop0): Can't find a valid FAT filesystem [ 587.178883][ T26] audit: type=1800 audit(1576044134.851:227): pid=19737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17924 res=0 [ 587.271085][ T26] audit: type=1800 audit(1576044134.851:228): pid=19737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17924 res=0 [ 587.360392][ T26] audit: type=1800 audit(1576044134.911:229): pid=19730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17924 res=0 [ 587.897502][ T28] device bridge_slave_1 left promiscuous mode [ 587.903770][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.959170][ T28] device bridge_slave_0 left promiscuous mode [ 587.965484][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.607632][ T28] device hsr_slave_0 left promiscuous mode [ 588.657070][ T28] device hsr_slave_1 left promiscuous mode [ 588.743600][ T28] team0 (unregistering): Port device team_slave_1 removed [ 588.754444][ T28] team0 (unregistering): Port device team_slave_0 removed [ 588.765094][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 588.790837][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 588.858594][ T28] bond0 (unregistering): Released all slaves [ 588.973728][T19756] IPVS: ftp: loaded support on port[0] = 21 [ 589.023926][T19756] chnl_net:caif_netlink_parms(): no params data found [ 589.097143][T19756] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.104300][T19756] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.112598][T19756] device bridge_slave_0 entered promiscuous mode [ 589.120379][T19756] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.127558][T19756] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.135375][T19756] device bridge_slave_1 entered promiscuous mode [ 589.154844][T19756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 589.165703][T19756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 589.185307][T19756] team0: Port device team_slave_0 added [ 589.195219][T19756] team0: Port device team_slave_1 added [ 589.259663][T19756] device hsr_slave_0 entered promiscuous mode [ 589.320105][T19756] device hsr_slave_1 entered promiscuous mode [ 589.375553][T19756] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.382623][T19756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.389952][T19756] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.396995][T19756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.435713][T19756] 8021q: adding VLAN 0 to HW filter on device bond0 [ 589.452218][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 589.463173][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.471772][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.485065][T19756] 8021q: adding VLAN 0 to HW filter on device team0 [ 589.497006][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 589.505368][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.512424][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.528849][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 589.537398][ T3512] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.544422][ T3512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.562970][T19756] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 589.573612][T19756] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 589.587366][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 589.596563][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 589.605540][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 589.614875][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 589.623701][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 589.631864][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 589.648234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 589.655770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 589.666344][T19756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 589.783137][T19765] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:17 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() tkill(r0, 0x1000000000013) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:02:17 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:17 executing program 5: r0 = socket$inet(0x10, 0x80003, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0804b5055e0bcfe8474071") sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000180007041dfffd946f6115000a0000001f000000005f0800080001000400ff7e", 0x24}], 0x1}, 0x0) 06:02:17 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) close(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000000000000029a458891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000004c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 589.931225][T19773] FAT-fs (loop0): invalid media value (0x00) [ 589.937399][T19773] FAT-fs (loop0): Can't find a valid FAT filesystem [ 590.004226][ T26] audit: type=1800 audit(1576044137.671:230): pid=19773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17966 res=0 06:02:17 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:17 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 590.063247][ T26] audit: type=1800 audit(1576044137.701:231): pid=19773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17966 res=0 [ 590.169971][ T26] audit: type=1800 audit(1576044137.771:232): pid=19785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17966 res=0 06:02:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 590.361714][T19793] serial8250_do_startup: 4 callbacks suppressed [ 590.361791][T19793] ttyS3: LSR safety check engaged! 06:02:18 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:18 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 590.414780][T19793] ttyS3: LSR safety check engaged! [ 590.461992][T19797] tty_tiocsserial: 'syz-executor.5' is using deprecated serial flags (with no effect): 00008700 06:02:18 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 591.557668][ T7877] device bridge_slave_1 left promiscuous mode [ 591.563933][ T7877] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.617735][ T7877] device bridge_slave_0 left promiscuous mode [ 591.624010][ T7877] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.327252][ T7877] device hsr_slave_0 left promiscuous mode [ 592.367098][ T7877] device hsr_slave_1 left promiscuous mode [ 592.423805][ T7877] team0 (unregistering): Port device team_slave_1 removed [ 592.434120][ T7877] team0 (unregistering): Port device team_slave_0 removed [ 592.444317][ T7877] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 592.470701][ T7877] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 592.549815][ T7877] bond0 (unregistering): Released all slaves [ 592.644150][T19818] IPVS: ftp: loaded support on port[0] = 21 [ 592.694739][T19818] chnl_net:caif_netlink_parms(): no params data found [ 592.722129][T19818] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.729243][T19818] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.737248][T19818] device bridge_slave_0 entered promiscuous mode [ 592.744918][T19818] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.752049][T19818] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.759884][T19818] device bridge_slave_1 entered promiscuous mode [ 592.811504][T19818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 592.822711][T19818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 592.845002][T19818] team0: Port device team_slave_0 added [ 592.854100][T19818] team0: Port device team_slave_1 added 06:02:20 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:20 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:02:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:20 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) close(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="060000000000000029a458891b0f018f54f3"], 0x0, 0x12}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000004c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:02:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 592.946337][T19818] device hsr_slave_0 entered promiscuous mode [ 593.050373][T19818] device hsr_slave_1 entered promiscuous mode [ 593.058754][T19833] tty_tiocsserial: 'syz-executor.5' is using deprecated serial flags (with no effect): 00008700 06:02:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 593.103670][T19818] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.110751][T19818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.118033][T19818] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.125103][T19818] bridge0: port 1(bridge_slave_0) entered forwarding state 06:02:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@part={'part'}}]}) 06:02:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 593.304367][T19818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 593.358395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 593.395760][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.432642][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.495132][T19818] 8021q: adding VLAN 0 to HW filter on device team0 [ 593.523747][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 06:02:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 593.542898][T19848] hfsplus: unable to find HFS+ superblock [ 593.559316][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.566386][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.614594][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 593.629679][T18710] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.636896][T18710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.724865][T19818] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 593.811319][T19818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 593.840494][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 593.861583][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 593.886743][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 593.914139][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 593.926192][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 593.943568][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 593.954743][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 593.963304][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 593.971799][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 593.980004][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 594.016500][T19818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 594.029979][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 594.045619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 594.257337][T19873] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:22 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) close(r2) [ 594.462788][T19879] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:23 executing program 2: wait4(0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x402812f6, &(0x7f0000000200)={0x700}) 06:02:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r1, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="4208e911499aa202b8617b932d7c902b", 0x10) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 06:02:23 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 596.221850][T19892] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:24 executing program 2: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_opts(r2, 0x0, 0x15, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = memfd_create(&(0x7f0000000080)='keyring[)mime_typewlan1-selinuxvboxnet0$nodeveth0\x00', 0x0) write(r5, &(0x7f0000000040)="06", 0x1) sendfile(r5, r5, &(0x7f0000001000), 0xffff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r6, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 06:02:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4010ae42, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) 06:02:24 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 596.508190][ T26] audit: type=1800 audit(1576044144.181:233): pid=19924 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17998 res=0 06:02:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 596.590205][ T26] audit: type=1800 audit(1576044144.231:234): pid=19924 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17998 res=0 [ 596.712154][T19942] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:26 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x69655d8834c6e665, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7}, 0xffffffffffffff7c) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(r8, &(0x7f0000000000), 0x0) openat$cgroup_ro(r8, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x2, r9, 0x1, 0x1, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r11 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r10}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) write$P9_RLINK(r11, &(0x7f00000004c0)={0x7, 0x47, 0x1}, 0x7) 06:02:26 executing program 2: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_opts(r2, 0x0, 0x15, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = memfd_create(&(0x7f0000000080)='keyring[)mime_typewlan1-selinuxvboxnet0$nodeveth0\x00', 0x0) write(r5, &(0x7f0000000040)="06", 0x1) sendfile(r5, r5, &(0x7f0000001000), 0xffff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r6, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 06:02:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:26 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 599.237940][ T26] audit: type=1800 audit(1576044146.911:235): pid=19957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=45 res=0 [ 599.316451][T19964] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:27 executing program 2: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_opts(r2, 0x0, 0x15, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = memfd_create(&(0x7f0000000080)='keyring[)mime_typewlan1-selinuxvboxnet0$nodeveth0\x00', 0x0) write(r5, &(0x7f0000000040)="06", 0x1) sendfile(r5, r5, &(0x7f0000001000), 0xffff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r6, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 06:02:27 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 599.437021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 599.442819][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:02:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x0, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 599.587567][T19989] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. [ 599.639406][ T26] audit: type=1800 audit(1576044147.311:236): pid=19972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=45 res=0 06:02:27 executing program 2: open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_opts(r2, 0x0, 0x15, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe94, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = memfd_create(&(0x7f0000000080)='keyring[)mime_typewlan1-selinuxvboxnet0$nodeveth0\x00', 0x0) write(r5, &(0x7f0000000040)="06", 0x1) sendfile(r5, r5, &(0x7f0000001000), 0xffff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r6, &(0x7f00000002c0)=ANY=[], 0xae9d8214) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 06:02:27 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 600.897546][ T28] device bridge_slave_1 left promiscuous mode [ 600.903780][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.967577][ T28] device bridge_slave_0 left promiscuous mode [ 600.973787][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.657418][ T28] device hsr_slave_0 left promiscuous mode [ 601.717021][ T28] device hsr_slave_1 left promiscuous mode [ 601.763606][ T28] team0 (unregistering): Port device team_slave_1 removed [ 601.773986][ T28] team0 (unregistering): Port device team_slave_0 removed [ 601.784110][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 601.820477][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 601.897450][ T28] bond0 (unregistering): Released all slaves 06:02:29 executing program 3: socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:29 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, 0x14, 0x400000201, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:02:29 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:29 executing program 5: 06:02:30 executing program 5: [ 602.433714][ T26] audit: type=1800 audit(1576044150.101:237): pid=20020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=46 res=0 06:02:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:30 executing program 5: 06:02:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:30 executing program 5: [ 602.967099][ T26] audit: type=1800 audit(1576044150.631:238): pid=20031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=46 res=0 06:02:30 executing program 5: [ 604.585351][T20057] IPVS: ftp: loaded support on port[0] = 21 [ 604.634191][T20057] chnl_net:caif_netlink_parms(): no params data found [ 604.659918][T20057] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.667178][T20057] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.674933][T20057] device bridge_slave_0 entered promiscuous mode [ 604.682723][T20057] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.689921][T20057] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.697826][T20057] device bridge_slave_1 entered promiscuous mode [ 604.714334][T20057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 604.724967][T20057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 604.743893][T20057] team0: Port device team_slave_0 added [ 604.750709][T20057] team0: Port device team_slave_1 added [ 604.799421][T20057] device hsr_slave_0 entered promiscuous mode [ 604.847406][T20057] device hsr_slave_1 entered promiscuous mode [ 604.894568][T20057] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.901626][T20057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.908899][T20057] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.915942][T20057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.946380][T20057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 604.957914][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.965958][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.974239][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.983293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 604.995290][T20057] 8021q: adding VLAN 0 to HW filter on device team0 [ 605.006090][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 605.014532][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.021612][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.032406][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 605.040943][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.048031][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.068987][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 605.078261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 605.087216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 605.098533][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 605.112324][T20057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 605.123608][T20057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 605.131926][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 605.145869][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 605.153468][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 605.164311][T20057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 605.284918][T20067] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:33 executing program 3: socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:33 executing program 2: 06:02:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:33 executing program 5: 06:02:33 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 605.521540][ T26] audit: type=1800 audit(1576044153.191:239): pid=20072 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=47 res=0 06:02:33 executing program 5: 06:02:33 executing program 2: 06:02:33 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:33 executing program 5: 06:02:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:33 executing program 2: [ 605.924030][ T26] audit: type=1800 audit(1576044153.591:240): pid=20081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=47 res=0 [ 606.677705][ T28] device bridge_slave_1 left promiscuous mode [ 606.684338][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.727843][ T28] device bridge_slave_0 left promiscuous mode [ 606.735628][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.427504][ T28] device hsr_slave_0 left promiscuous mode [ 607.467037][ T28] device hsr_slave_1 left promiscuous mode [ 607.513097][ T28] team0 (unregistering): Port device team_slave_1 removed [ 607.525556][ T28] team0 (unregistering): Port device team_slave_0 removed [ 607.536461][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 607.560799][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 607.656661][ T28] bond0 (unregistering): Released all slaves 06:02:36 executing program 3: socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:36 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:36 executing program 2: 06:02:36 executing program 5: 06:02:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:36 executing program 2: [ 608.678134][ T26] audit: type=1800 audit(1576044156.341:241): pid=20106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=48 res=0 06:02:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:36 executing program 5: 06:02:36 executing program 5: 06:02:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:36 executing program 2: [ 609.260094][ T26] audit: type=1800 audit(1576044156.931:242): pid=20116 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=48 res=0 [ 610.645683][T20136] IPVS: ftp: loaded support on port[0] = 21 [ 610.695967][T20136] chnl_net:caif_netlink_parms(): no params data found [ 610.721630][T20136] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.728887][T20136] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.738913][T20136] device bridge_slave_0 entered promiscuous mode [ 610.746580][T20136] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.754793][T20136] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.762724][T20136] device bridge_slave_1 entered promiscuous mode [ 610.779345][T20136] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 610.791754][T20136] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 610.809723][T20136] team0: Port device team_slave_0 added [ 610.816557][T20136] team0: Port device team_slave_1 added [ 610.859339][T20136] device hsr_slave_0 entered promiscuous mode [ 610.897409][T20136] device hsr_slave_1 entered promiscuous mode [ 610.944608][T20136] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.952881][T20136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.960240][T20136] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.967984][T20136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.001226][T20136] 8021q: adding VLAN 0 to HW filter on device bond0 [ 611.012335][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 611.020543][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.029492][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.040746][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 611.053211][T20136] 8021q: adding VLAN 0 to HW filter on device team0 [ 611.063583][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 611.072048][ T7831] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.079191][ T7831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.098646][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 611.107347][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.114466][ T7675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.124204][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 611.134207][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 611.145710][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 611.157527][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 611.169975][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 611.180296][T20136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 611.195253][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 611.202746][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 611.214449][T20136] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 611.346628][T20146] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:39 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:39 executing program 2: 06:02:39 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0x0) 06:02:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:39 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:39 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:39 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 611.771206][ T26] audit: type=1800 audit(1576044159.441:243): pid=20153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=49 res=0 06:02:39 executing program 2: r0 = gettid() creat(0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) tkill(r0, 0x13) 06:02:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:39 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 06:02:39 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) [ 612.287043][ T26] audit: type=1800 audit(1576044159.951:244): pid=20164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=49 res=0 [ 612.957650][ T7] device bridge_slave_1 left promiscuous mode [ 612.963872][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.017941][ T7] device bridge_slave_0 left promiscuous mode [ 613.024258][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.707426][ T7] device hsr_slave_0 left promiscuous mode [ 613.757033][ T7] device hsr_slave_1 left promiscuous mode [ 613.819959][ T7] team0 (unregistering): Port device team_slave_1 removed [ 613.831574][ T7] team0 (unregistering): Port device team_slave_0 removed [ 613.842623][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 613.910286][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 613.987648][ T7] bond0 (unregistering): Released all slaves [ 614.084505][T20185] IPVS: ftp: loaded support on port[0] = 21 [ 614.138182][T20185] chnl_net:caif_netlink_parms(): no params data found [ 614.163986][T20185] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.171212][T20185] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.180578][T20185] device bridge_slave_0 entered promiscuous mode [ 614.188519][T20185] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.195588][T20185] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.203627][T20185] device bridge_slave_1 entered promiscuous mode [ 614.269557][T20185] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 614.282917][T20185] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 614.309376][T20185] team0: Port device team_slave_0 added [ 614.316906][T20185] team0: Port device team_slave_1 added [ 614.390714][T20185] device hsr_slave_0 entered promiscuous mode [ 614.487494][T20185] device hsr_slave_1 entered promiscuous mode [ 614.535183][T20185] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.542391][T20185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 614.549736][T20185] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.556761][T20185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.600149][T20185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 614.614035][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 614.623825][ T7675] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.631825][ T7675] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.644971][T20185] 8021q: adding VLAN 0 to HW filter on device team0 [ 614.656480][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 614.665161][ T7675] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.672410][ T7675] bridge0: port 1(bridge_slave_0) entered forwarding state 06:02:42 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:42 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_getaffinity(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) fcntl$setflags(r0, 0x2, 0x0) 06:02:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(0x0, 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:42 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fchownat(r0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000380)={0x18, 0x71, 0x1, {{0x8, 0x3, 0x5}, 0x20}}, 0x18) [ 614.705897][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 614.714541][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.721823][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 614.796368][T20185] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 614.851035][T20185] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 614.878641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 614.901291][ T26] audit: type=1800 audit(1576044162.571:245): pid=20192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=50 res=0 [ 614.909967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:02:42 executing program 2: 06:02:42 executing program 5: [ 614.953550][ T26] audit: type=1800 audit(1576044162.621:246): pid=20192 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=50 res=0 [ 614.979243][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 615.022875][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 615.059844][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 615.068169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 615.120857][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 615.130775][ T7831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 615.170804][T20185] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 615.375336][T20221] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:43 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(0x0, 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:43 executing program 5: 06:02:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:43 executing program 2: [ 615.560286][ T26] audit: type=1800 audit(1576044163.231:247): pid=20227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=51 res=0 [ 615.638280][ T26] audit: type=1800 audit(1576044163.271:248): pid=20227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=51 res=0 [ 616.777861][ T670] device bridge_slave_1 left promiscuous mode [ 616.784181][ T670] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.847876][ T670] device bridge_slave_0 left promiscuous mode [ 616.854110][ T670] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.577496][ T670] device hsr_slave_0 left promiscuous mode [ 617.616989][ T670] device hsr_slave_1 left promiscuous mode [ 617.693557][ T670] team0 (unregistering): Port device team_slave_1 removed [ 617.703919][ T670] team0 (unregistering): Port device team_slave_0 removed [ 617.713817][ T670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 617.760451][ T670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 06:02:45 executing program 5: 06:02:45 executing program 2: 06:02:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:45 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(0x0, 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:45 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 617.935882][ T670] bond0 (unregistering): Released all slaves [ 617.956168][ T26] audit: type=1800 audit(1576044165.621:249): pid=20241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=52 res=0 06:02:45 executing program 2: 06:02:45 executing program 5: [ 618.096749][ T26] audit: type=1800 audit(1576044165.681:250): pid=20245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=52 res=0 06:02:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:46 executing program 2: 06:02:46 executing program 5: 06:02:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:46 executing program 2: 06:02:46 executing program 5: [ 618.641225][ T26] audit: type=1800 audit(1576044166.311:251): pid=20266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16538 res=0 [ 618.749016][ T26] audit: type=1804 audit(1576044166.311:252): pid=20266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/105/file0/file0" dev="sda1" ino=16538 res=1 [ 618.908680][ T26] audit: type=1804 audit(1576044166.341:253): pid=20266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/105/file0/file0" dev="sda1" ino=16538 res=1 [ 620.277853][T20282] IPVS: ftp: loaded support on port[0] = 21 [ 620.329429][T20282] chnl_net:caif_netlink_parms(): no params data found [ 620.354440][T20282] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.361547][T20282] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.369407][T20282] device bridge_slave_0 entered promiscuous mode [ 620.376843][T20282] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.384094][T20282] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.391886][T20282] device bridge_slave_1 entered promiscuous mode [ 620.409445][T20282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 620.419949][T20282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 620.438162][T20282] team0: Port device team_slave_0 added [ 620.445525][T20282] team0: Port device team_slave_1 added [ 620.509234][T20282] device hsr_slave_0 entered promiscuous mode [ 620.557333][T20282] device hsr_slave_1 entered promiscuous mode [ 620.634285][T20282] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.641384][T20282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 620.648745][T20282] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.655779][T20282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 620.686583][T20282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 620.697813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 620.705857][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.714004][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.722771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 620.735252][T20282] 8021q: adding VLAN 0 to HW filter on device team0 [ 620.746242][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 620.754652][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.761708][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 620.772453][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 620.781004][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.788048][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 620.805706][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 620.814551][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 620.830522][T20282] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 620.841332][T20282] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 620.853845][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 620.862708][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 620.871386][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 620.879961][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 620.894144][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 620.901657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 620.912505][T20282] 8021q: adding VLAN 0 to HW filter on device batadv0 06:02:48 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() gettid() tkill(0x0, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:48 executing program 2: [ 621.107559][T20292] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:48 executing program 5: 06:02:48 executing program 2: 06:02:48 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:48 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() gettid() tkill(0x0, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:48 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() gettid() tkill(0x0, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:49 executing program 5: 06:02:49 executing program 2: [ 621.381606][ T26] audit: type=1800 audit(1576044169.051:254): pid=20311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=53 res=0 06:02:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 621.507065][ T26] audit: type=1804 audit(1576044169.081:255): pid=20311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/106/file0/file0" dev="loop0" ino=53 res=1 06:02:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 621.560881][ T26] audit: type=1804 audit(1576044169.081:256): pid=20311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/106/file0/file0" dev="loop0" ino=53 res=1 06:02:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:49 executing program 5: 06:02:49 executing program 2: 06:02:49 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:49 executing program 5: 06:02:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 621.860694][ T26] audit: type=1800 audit(1576044169.531:257): pid=20340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=54 res=0 06:02:49 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 621.991239][ T26] audit: type=1804 audit(1576044169.551:258): pid=20340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/107/file0/file0" dev="loop0" ino=54 res=1 06:02:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:49 executing program 2: 06:02:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:49 executing program 5: [ 622.140494][ T26] audit: type=1804 audit(1576044169.551:259): pid=20340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir994148249/syzkaller.gVO0YO/107/file0/file0" dev="loop0" ino=54 res=1 06:02:50 executing program 2: 06:02:50 executing program 5: 06:02:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) [ 622.494886][ T26] audit: type=1800 audit(1576044170.161:260): pid=20374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=55 res=0 [ 622.611954][ T26] audit: type=1800 audit(1576044170.171:261): pid=20374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=55 res=0 06:02:50 executing program 2: 06:02:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 622.734952][ T26] audit: type=1800 audit(1576044170.201:262): pid=20374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=55 res=0 06:02:50 executing program 5: 06:02:50 executing program 2: [ 623.070176][ T26] audit: type=1800 audit(1576044170.741:263): pid=20391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=56 res=0 [ 623.577442][ T21] device bridge_slave_1 left promiscuous mode [ 623.583578][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.637621][ T21] device bridge_slave_0 left promiscuous mode [ 623.643894][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.357303][ T21] device hsr_slave_0 left promiscuous mode [ 624.397006][ T21] device hsr_slave_1 left promiscuous mode [ 624.464464][ T21] team0 (unregistering): Port device team_slave_1 removed [ 624.476038][ T21] team0 (unregistering): Port device team_slave_0 removed [ 624.487314][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 624.540459][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 624.587378][ T21] bond0 (unregistering): Released all slaves [ 624.723759][T20401] IPVS: ftp: loaded support on port[0] = 21 [ 624.776809][T20401] chnl_net:caif_netlink_parms(): no params data found [ 624.847006][T20401] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.854106][T20401] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.862473][T20401] device bridge_slave_0 entered promiscuous mode [ 624.870498][T20401] bridge0: port 2(bridge_slave_1) entered blocking state [ 624.877901][T20401] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.885895][T20401] device bridge_slave_1 entered promiscuous mode [ 624.904148][T20401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 624.917492][T20401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 624.938035][T20401] team0: Port device team_slave_0 added [ 624.945099][T20401] team0: Port device team_slave_1 added [ 625.002210][T20401] device hsr_slave_0 entered promiscuous mode [ 625.047419][T20401] device hsr_slave_1 entered promiscuous mode [ 625.108052][T20401] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.115107][T20401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.122376][T20401] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.129487][T20401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.170535][T20401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 625.185931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 625.194988][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.206153][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.221482][T20401] 8021q: adding VLAN 0 to HW filter on device team0 [ 625.232796][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.241308][T18710] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.248607][T18710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.286752][T20401] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 625.299427][T20401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 625.313106][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 625.321819][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.328898][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.338187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 625.347380][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 625.356043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 625.364882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 625.373462][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 625.381318][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 625.396865][T20401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 625.404574][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 625.412484][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 625.523611][T20413] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:53 executing program 5: 06:02:53 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @empty}, 0x10) 06:02:53 executing program 2: 06:02:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(0xffffffffffffffff, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:53 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:53 executing program 2: 06:02:53 executing program 5: 06:02:53 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x0) 06:02:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:53 executing program 5: 06:02:53 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:53 executing program 2: 06:02:53 executing program 5: 06:02:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x0) 06:02:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:54 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:54 executing program 2: 06:02:54 executing program 5: [ 626.610670][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 626.610685][ T26] audit: type=1800 audit(1576044174.281:272): pid=20464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=59 res=0 [ 626.708127][ T26] audit: type=1800 audit(1576044174.281:273): pid=20464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=59 res=0 [ 626.782830][ T26] audit: type=1800 audit(1576044174.281:274): pid=20464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=59 res=0 [ 627.487508][ T21] device bridge_slave_1 left promiscuous mode [ 627.493744][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.547865][ T21] device bridge_slave_0 left promiscuous mode [ 627.554124][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.277281][ T21] device hsr_slave_0 left promiscuous mode [ 628.327088][ T21] device hsr_slave_1 left promiscuous mode [ 628.382939][ T21] team0 (unregistering): Port device team_slave_1 removed [ 628.393580][ T21] team0 (unregistering): Port device team_slave_0 removed [ 628.403729][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 628.450108][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 628.537350][ T21] bond0 (unregistering): Released all slaves [ 628.634012][T20472] IPVS: ftp: loaded support on port[0] = 21 [ 628.684368][T20472] chnl_net:caif_netlink_parms(): no params data found [ 628.711549][T20472] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.718646][T20472] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.726503][T20472] device bridge_slave_0 entered promiscuous mode [ 628.734177][T20472] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.741661][T20472] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.749607][T20472] device bridge_slave_1 entered promiscuous mode [ 628.830243][T20472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 628.841416][T20472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 628.861649][T20472] team0: Port device team_slave_0 added [ 628.869369][T20472] team0: Port device team_slave_1 added 06:02:56 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0xa0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x0) 06:02:56 executing program 5: 06:02:56 executing program 2: 06:02:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x0) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 628.939161][T20472] device hsr_slave_0 entered promiscuous mode 06:02:56 executing program 5: [ 629.011765][T20472] device hsr_slave_1 entered promiscuous mode 06:02:56 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 629.084146][T20472] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.091247][T20472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.098583][T20472] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.105609][T20472] bridge0: port 1(bridge_slave_0) entered forwarding state 06:02:56 executing program 2: [ 629.174347][ T26] audit: type=1800 audit(1576044176.841:275): pid=20478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=18084 res=0 06:02:56 executing program 4: [ 629.293038][ T26] audit: type=1800 audit(1576044176.881:276): pid=20488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=18084 res=0 [ 629.341637][T20472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 629.430293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.446037][ T26] audit: type=1800 audit(1576044176.911:277): pid=20478 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=18084 res=0 [ 629.470087][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.509588][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.533156][T20472] 8021q: adding VLAN 0 to HW filter on device team0 [ 629.610100][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.630221][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.637349][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.672155][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.680756][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.687808][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.697890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 629.706815][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 629.716821][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 629.726114][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 629.741948][T20472] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 629.752766][T20472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 629.764644][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 629.773165][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.782402][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 629.791369][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.799835][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 629.817658][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 629.825053][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 629.835498][T20472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 629.954329][T20515] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:02:57 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:57 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 06:02:57 executing program 5: 06:02:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:02:57 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 06:02:57 executing program 2: mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5e831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4ca31, 0xffffffffffffffff, 0x1000000) 06:02:57 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xffffffffffffff64, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a290930206040000000001020009003900090035000c0301000000190005", 0x2b}], 0x1, 0x0, 0xffffffffffffffc0}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x2ba, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") [ 630.184546][ T26] audit: type=1800 audit(1576044177.851:278): pid=20524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=60 res=0 06:02:57 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x359}, 0x48) [ 630.261451][ T26] audit: type=1800 audit(1576044177.891:279): pid=20524 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=60 res=0 06:02:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r1, 0xb) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup3(r3, r4, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r6 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:02:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfdee}, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x800000000031, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 630.381208][T20540] [ 630.383645][T20540] ********************************************************** [ 630.413652][T20540] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** 06:02:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 630.446016][T20540] ** ** [ 630.464138][T20540] ** trace_printk() being used. Allocating extra memory. ** [ 630.499185][T20540] ** ** [ 630.518216][T20540] ** This means that this is a DEBUG kernel and it is ** [ 630.534302][T20540] ** unsafe for production use. ** [ 630.541811][ T26] audit: type=1800 audit(1576044178.201:280): pid=20536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=60 res=0 [ 630.564384][T20540] ** ** [ 630.577361][T20540] ** If you see this message and you are not debugging ** 06:02:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r1, &(0x7f0000000540)={&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}, 0x0) [ 630.592716][T20540] ** the kernel, report this immediately to your vendor! ** [ 630.606886][T20540] ** ** [ 630.620168][T20540] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 630.628710][T20540] ********************************************************** 06:02:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r7 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r7, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r8 = socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r8, 0x8919, &(0x7f0000000540)={'ipddp0\x00', {0x2, 0x4e23, @empty}}) sendmsg$TIPC_NL_MON_SET(r8, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYBLOB="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"], 0x3}}, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) [ 630.810736][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 631.103283][T20559] device lo entered promiscuous mode [ 631.629308][T20556] device lo left promiscuous mode [ 631.660723][T20558] device lo entered promiscuous mode [ 631.669165][ T21] device bridge_slave_1 left promiscuous mode [ 631.676002][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.728647][ T21] device bridge_slave_0 left promiscuous mode [ 631.734885][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.437226][ T21] device hsr_slave_0 left promiscuous mode [ 632.487122][ T21] device hsr_slave_1 left promiscuous mode [ 632.542548][ T21] team0 (unregistering): Port device team_slave_1 removed [ 632.555280][ T21] team0 (unregistering): Port device team_slave_0 removed [ 632.565658][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 632.610986][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 632.686637][ T21] bond0 (unregistering): Released all slaves [ 632.771886][T20565] IPVS: ftp: loaded support on port[0] = 21 [ 632.838916][T20565] chnl_net:caif_netlink_parms(): no params data found [ 632.909617][T20565] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.916720][T20565] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.927704][T20565] device bridge_slave_0 entered promiscuous mode [ 632.935571][T20565] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.945243][T20565] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.953941][T20565] device bridge_slave_1 entered promiscuous mode [ 632.974411][T20565] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 632.987785][T20565] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 633.009620][T20565] team0: Port device team_slave_0 added [ 633.016577][T20565] team0: Port device team_slave_1 added 06:03:00 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 06:03:00 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 06:03:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:03:00 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:03:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r7 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r7, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r8 = socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r8, 0x8919, &(0x7f0000000540)={'ipddp0\x00', {0x2, 0x4e23, @empty}}) sendmsg$TIPC_NL_MON_SET(r8, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYBLOB="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"], 0x3}}, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) [ 633.099415][T20565] device hsr_slave_0 entered promiscuous mode [ 633.144085][T20565] device hsr_slave_1 entered promiscuous mode [ 633.165566][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:03:00 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 633.194368][T20565] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.201155][ T26] audit: type=1800 audit(1576044180.871:281): pid=20578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=61 res=0 [ 633.201475][T20565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.229038][T20565] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.236182][T20565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.263456][ T26] audit: type=1800 audit(1576044180.901:282): pid=20578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=61 res=0 06:03:01 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket(0x10, 0x800000000080002, 0x0) write(r1, &(0x7f0000000300)="220000002000070700be00000900070102000000000a000000200000050013800100", 0x22) [ 633.372823][T20587] device lo left promiscuous mode 06:03:01 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 633.511551][T20588] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 633.532373][T20592] device lo entered promiscuous mode [ 633.594254][ T26] audit: type=1800 audit(1576044181.261:283): pid=20590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=61 res=0 06:03:01 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket(0x10, 0x800000000080002, 0x0) write(r1, &(0x7f0000000300)="220000002000070700be00000900070102000000000a000000200000050013800100", 0x22) [ 633.637376][T20565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 633.666305][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 633.675219][ T7658] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.706215][ T7658] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.736136][T20565] 8021q: adding VLAN 0 to HW filter on device team0 [ 633.754215][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.765254][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.772371][ T7658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.791312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.800018][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.807079][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.825504][T20565] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 633.846432][T20565] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 633.860822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 633.870394][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 633.879836][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 633.891483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 633.902135][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 633.912610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 633.922514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 633.957259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 633.965865][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 633.988050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 634.010818][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 634.018782][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 634.038285][T20565] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 634.149469][T20628] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:03:01 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="00000080000000000000c4c1080001006270660050000200080006000000000004008500400002003c0001000000000002000020000000000b75daf6a86081eca8028916a444b22bfb92d07f000000001000000000f6ffffff00000000000000000000000000ddff00ff00000000000000005cded0bbdefd6b4e776e288b2cebe35d91f7a872d9108c73cc341ccca5c022781900e4d1228a7b02dcbed27e8c2735b59868f9d96fde47cf2d5fca0aec34c42eeb91b23a717cc5f13115a7c87ed402e34860a4a0240e9557e245110fc0d3fa935a85c321b886160ca147d1fb9e01b37a6386596abddcf4f8ea01272f8e7e20b2356962f8bb9cbd0d34ab"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:03:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:03:01 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:03:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r7 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r7, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r8 = socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r8, 0x8919, &(0x7f0000000540)={'ipddp0\x00', {0x2, 0x4e23, @empty}}) sendmsg$TIPC_NL_MON_SET(r8, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYBLOB="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"], 0x3}}, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 06:03:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYRES32], 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 634.276740][ T26] audit: type=1800 audit(1576044181.941:284): pid=20631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=62 res=0 [ 634.309303][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 634.315520][ T26] audit: type=1800 audit(1576044181.971:285): pid=20631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=62 res=0 [ 634.387539][T20640] device lo left promiscuous mode 06:03:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYRES32], 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 06:03:02 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 634.514532][ T26] audit: type=1800 audit(1576044182.181:286): pid=20639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=62 res=0 06:03:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:03:02 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) shmget(0x1, 0x1000, 0x20, &(0x7f0000ffd000/0x1000)=nil) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 634.675188][T20643] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 634.686639][T20646] device lo entered promiscuous mode [ 634.694703][T20654] netlink: 'syz-executor.4': attribute type 19 has an invalid length. 06:03:02 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) shmctl$SHM_LOCK(0x0, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 634.773016][ T26] audit: type=1800 audit(1576044182.441:287): pid=20657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=63 res=0 [ 634.820051][ T26] audit: type=1800 audit(1576044182.471:288): pid=20657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=63 res=0 [ 635.077042][ T26] audit: type=1800 audit(1576044182.741:289): pid=20660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=63 res=0 [ 635.937735][ T21] device bridge_slave_1 left promiscuous mode [ 635.943978][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.977903][ T21] device bridge_slave_0 left promiscuous mode [ 635.984088][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 06:03:04 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:03:04 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:03:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r7 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r7, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r8 = socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r8, 0x8919, &(0x7f0000000540)={'ipddp0\x00', {0x2, 0x4e23, @empty}}) sendmsg$TIPC_NL_MON_SET(r8, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYBLOB="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"], 0x3}}, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 06:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:03:04 executing program 4: mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) [ 636.606513][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 636.621895][ T26] audit: type=1800 audit(1576044184.291:290): pid=20666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=64 res=0 06:03:04 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:03:04 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 06:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 636.957450][ T21] device hsr_slave_0 left promiscuous mode [ 637.017049][ T21] device hsr_slave_1 left promiscuous mode [ 637.077689][ T21] team0 (unregistering): Port device team_slave_1 removed [ 637.100594][ T21] team0 (unregistering): Port device team_slave_0 removed [ 637.114684][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 06:03:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 637.191153][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 637.261842][ T21] bond0 (unregistering): Released all slaves [ 637.369742][T20685] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 637.396126][T20687] device lo left promiscuous mode 06:03:05 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 637.518124][T20695] device lo entered promiscuous mode 06:03:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) [ 637.542227][T20701] IPVS: ftp: loaded support on port[0] = 21 [ 637.694051][T20719] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 637.792224][T20701] chnl_net:caif_netlink_parms(): no params data found [ 637.850223][T20701] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.865404][T20701] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.877839][T20701] device bridge_slave_0 entered promiscuous mode [ 637.892561][T20701] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.899886][T20701] bridge0: port 2(bridge_slave_1) entered disabled state [ 637.910473][T20701] device bridge_slave_1 entered promiscuous mode [ 637.932983][T20701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 637.944323][T20701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 637.969827][T20701] team0: Port device team_slave_0 added [ 637.977071][T20701] team0: Port device team_slave_1 added [ 638.049637][T20701] device hsr_slave_0 entered promiscuous mode [ 638.089828][T20701] device hsr_slave_1 entered promiscuous mode [ 638.159237][T20701] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.166377][T20701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 638.173672][T20701] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.180706][T20701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 638.237894][T20701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 638.250215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 638.258571][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.266375][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.289596][T20701] 8021q: adding VLAN 0 to HW filter on device team0 [ 638.301904][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 638.310428][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 638.317566][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 638.339135][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 638.347516][T20403] bridge0: port 2(bridge_slave_1) entered blocking state [ 638.354533][T20403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 638.363676][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 638.372778][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 638.382948][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 638.399632][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 638.408331][T20403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 638.420300][T20701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 638.431997][T20701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 638.447279][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 638.455698][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 638.484484][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 638.492238][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 638.502856][T20701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 638.605749][T20740] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 06:03:06 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) shmctl$SHM_LOCK(0x0, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:03:06 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @loopback, 0x1, 0x2, [@loopback, @broadcast]}, 0x18) 06:03:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r6 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r6, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r7 = socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r7, 0x8919, &(0x7f0000000540)={'ipddp0\x00', {0x2, 0x4e23, @empty}}) sendmsg$TIPC_NL_MON_SET(r7, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r8, @ANYBLOB="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"], 0x3}}, 0x0) 06:03:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) 06:03:06 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$inet6(0xa, 0x80003, 0x6b) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:03:06 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 638.726595][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 638.726611][ T26] audit: type=1800 audit(1576044186.391:302): pid=20745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=68 res=0 [ 638.755278][T20752] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 638.764683][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 638.798741][ T26] audit: type=1800 audit(1576044186.401:303): pid=20745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=68 res=0 [ 638.867768][T20758] device lo left promiscuous mode [ 638.964544][ T26] audit: type=1800 audit(1576044186.631:304): pid=20753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=68 res=0 [ 639.076105][T20758] device lo entered promiscuous mode 06:03:07 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = gettid() r1 = gettid() tkill(r1, 0x1000000000013) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:03:07 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 06:03:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(0x0, 0x1af242, 0x0) 06:03:07 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) shmctl$SHM_LOCK(0x0, 0xb) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_getoverrun(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'yam0\x00'}, 0x18) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000540)=[&(0x7f0000000280)='%O}]self\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='lo[\\eth1*\'@\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\\\x00', &(0x7f00000004c0)=':\x00', &(0x7f0000000500)='*keyring\x00']) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x8000, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup3(r2, r3, 0x0) dup2(r4, 0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r4, 0x8982, &(0x7f0000000580)) listxattr(0x0, &(0x7f0000000240)=""/54, 0x36) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="7c0000002d0001070000b3e563f53708a79000006d2777afd4e185c086a95d931d5cfc4d76c3266eeb05f9f7f3460016493311affa9bb6a1da7cca8f1637f6555106b8a3d92537f0dd14063bc9d7ca205c1758ebef44f10f9c3c6bd673710408d505e64fdc8e2eb9e783f3926fe38fd24567a5e0d0a4670a82982315b6fa65ab709215dd2ee6", @ANYRES32, @ANYBLOB="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"], 0x7c}}, 0x0) r5 = socket(0x4000000000010, 0x1000000000080002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x42, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:03:07 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:03:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r6 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r6, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r7 = socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r7, 0x8919, &(0x7f0000000540)={'ipddp0\x00', {0x2, 0x4e23, @empty}}) [ 639.801795][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 639.864276][T20780] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 639.898511][ T26] audit: type=1800 audit(1576044187.571:305): pid=20772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 06:03:07 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept(r1, 0x0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x715000) [ 639.969246][ T26] audit: type=1800 audit(1576044187.591:306): pid=20772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 [ 639.992173][T20770] device lo left promiscuous mode [ 640.142639][T20789] device lo entered promiscuous mode 06:03:08 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x622, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 640.317849][ T21] device bridge_slave_1 left promiscuous mode [ 640.324051][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.387787][ T21] device bridge_slave_0 left promiscuous mode [ 640.395973][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 06:03:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(0x0, 0x1af242, 0x0) 06:03:08 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 06:03:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r6 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r6, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 640.718814][ T26] audit: type=1800 audit(1576044188.391:307): pid=20805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=70 res=0 [ 640.821235][ T26] audit: type=1800 audit(1576044188.421:308): pid=20805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=70 res=0 [ 640.926854][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:03:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(0x0, 0x1af242, 0x0) [ 641.402317][ T26] audit: type=1800 audit(1576044189.071:309): pid=20824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=71 res=0 [ 641.449024][ T26] audit: type=1800 audit(1576044189.101:310): pid=20824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=71 res=0 [ 641.867530][ T21] device hsr_slave_0 left promiscuous mode [ 641.907077][ T21] device hsr_slave_1 left promiscuous mode [ 641.963970][ T21] team0 (unregistering): Port device team_slave_1 removed [ 641.974597][ T21] team0 (unregistering): Port device team_slave_0 removed [ 641.984862][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 642.051385][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 642.125059][ T21] bond0 (unregistering): Released all slaves [ 642.240465][T20816] device lo left promiscuous mode [ 642.271474][T20818] device lo entered promiscuous mode [ 642.285556][T20832] IPVS: ftp: loaded support on port[0] = 21 [ 642.425971][T20832] chnl_net:caif_netlink_parms(): no params data found [ 642.460917][T20832] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.469302][T20832] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.477824][T20832] device bridge_slave_0 entered promiscuous mode [ 642.485680][T20832] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.495742][T20832] bridge0: port 2(bridge_slave_1) entered disabled state [ 642.504071][T20832] device bridge_slave_1 entered promiscuous mode [ 642.529134][T20832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 642.540276][T20832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 642.563511][T20832] team0: Port device team_slave_0 added [ 642.573299][T20832] team0: Port device team_slave_1 added [ 642.661904][T20832] device hsr_slave_0 entered promiscuous mode [ 642.727363][T20832] device hsr_slave_1 entered promiscuous mode [ 642.775807][T20832] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.783422][T20832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 642.790738][T20832] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.797793][T20832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.829121][T20832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 642.841126][T18710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 642.849831][T18710] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.857739][T18710] bridge0: port 2(bridge_slave_1) entered disabled state 06:03:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8476071") pipe(0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r6 = socket$caif_seqpacket(0x25, 0x5, 0x5) pwrite64(r6, &(0x7f0000000040)="16c6a1dca1d32cb615", 0x9, 0x1f) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 06:03:10 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x10, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="39000000110009006900000000000000ab00804802000000c600010700000014190013", 0x23}], 0x1) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) 06:03:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1af242, 0x0) ftruncate(r2, 0x28007d) sendfile(r1, r1, 0x0, 0x2008000fffffffe) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 642.880916][T20832] 8021q: adding VLAN 0 to HW filter on device team0 [ 642.892167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 642.903368][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.910432][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.966169][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 642.970696][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 642.986030][ T7675] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.993163][ T7675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 643.003870][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 643.013889][ T7675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 643.030868][T20832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 643.032143][ T26] audit: type=1800 audit(1576044190.701:311): pid=20842 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=72 res=0 [ 643.042132][T20832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 643.077551][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 643.085993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 643.096002][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 643.105409][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 643.116492][T20845] device lo left promiscuous mode [ 643.173153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 643.181824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 643.195235][T20845] device lo entered promiscuous mode [ 643.206893][T20832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 643.292683][T20848] ================================================================== [ 643.300814][T20848] BUG: KCSAN: data-race in fat_time_unix2fat / fat_truncate_time [ 643.308736][T20848] [ 643.311065][T20848] read to 0xffff888128ae3220 of 8 bytes by task 20847 on cpu 0: [ 643.318730][T20848] fat_time_unix2fat+0x99/0x2c0 [ 643.323608][T20848] __fat_write_inode+0x507/0x520 [ 643.328533][T20848] fat_write_inode+0x6d/0xf0 [ 643.333118][T20848] __writeback_single_inode+0x6f7/0x8e0 [ 643.338674][T20848] writeback_single_inode+0x232/0x310 [ 643.344054][T20848] sync_inode_metadata+0x74/0xa0 [ 643.349003][T20848] __generic_file_fsync+0x122/0x190 [ 643.354208][T20848] fat_file_fsync+0x58/0x120 [ 643.358830][T20848] vfs_fsync_range+0x82/0x150 [ 643.363518][T20848] generic_file_write_iter+0x318/0x390 [ 643.368985][T20848] do_iter_readv_writev+0x487/0x5b0 [ 643.374194][T20848] do_iter_write+0x13b/0x3c0 [ 643.378800][T20848] vfs_iter_write+0x5c/0x80 [ 643.383308][T20848] iter_file_splice_write+0x4c0/0x7f0 [ 643.388684][T20848] direct_splice_actor+0xa0/0xc0 [ 643.393623][T20848] splice_direct_to_actor+0x215/0x510 [ 643.399028][T20848] do_splice_direct+0x161/0x1e0 [ 643.403888][T20848] do_sendfile+0x384/0x7f0 [ 643.408565][T20848] __x64_sys_sendfile64+0x12a/0x140 [ 643.413771][T20848] do_syscall_64+0xcc/0x370 [ 643.418291][T20848] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 643.424170][T20848] [ 643.426513][T20848] write to 0xffff888128ae3220 of 8 bytes by task 20848 on cpu 1: [ 643.434233][T20848] fat_truncate_time+0x145/0x2e0 [ 643.439178][T20848] fat_update_time+0x75/0x1c0 [ 643.443857][T20848] touch_atime+0x172/0x190 [ 643.448258][T20848] generic_file_read_iter+0x116e/0x1440 [ 643.453904][T20848] new_sync_read+0x389/0x4f0 [ 643.458478][T20848] __vfs_read+0xb1/0xc0 [ 643.462614][T20848] integrity_kernel_read+0xa1/0xe0 [ 643.467715][T20848] ima_calc_file_hash_tfm+0x1b5/0x260 [ 643.473083][T20848] ima_calc_file_hash+0x158/0xf40 [ 643.478100][T20848] ima_collect_measurement+0x3b1/0x3e0 [ 643.483537][T20848] process_measurement+0x9e3/0x1130 [ 643.488732][T20848] ima_file_check+0x7e/0xb0 [ 643.493245][T20848] path_openat+0xfaf/0x36e0 [ 643.497734][T20848] do_filp_open+0x11e/0x1b0 [ 643.502219][T20848] do_sys_open+0x3b3/0x4f0 [ 643.506693][T20848] __x64_sys_open+0x55/0x70 [ 643.511189][T20848] do_syscall_64+0xcc/0x370 [ 643.515716][T20848] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 643.521587][T20848] [ 643.523907][T20848] Reported by Kernel Concurrency Sanitizer on: [ 643.530051][T20848] CPU: 1 PID: 20848 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 643.538390][T20848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.549652][T20848] ================================================================== [ 643.557721][T20848] Kernel panic - not syncing: panic_on_warn set ... [ 643.564301][T20848] CPU: 1 PID: 20848 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 643.572601][T20848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.582635][T20848] Call Trace: [ 643.585911][T20848] dump_stack+0x11d/0x181 [ 643.590230][T20848] panic+0x210/0x640 [ 643.594106][T20848] ? vprintk_func+0x8d/0x140 [ 643.598696][T20848] kcsan_report.cold+0xc/0xd [ 643.603292][T20848] kcsan_setup_watchpoint+0x3fe/0x460 [ 643.608663][T20848] __tsan_unaligned_write8+0xc4/0x100 [ 643.614028][T20848] fat_truncate_time+0x145/0x2e0 [ 643.618960][T20848] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 643.624675][T20848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.630916][T20848] fat_update_time+0x75/0x1c0 [ 643.635586][T20848] ? __read_once_size.constprop.0+0x20/0x20 [ 643.641475][T20848] touch_atime+0x172/0x190 [ 643.645876][T20848] generic_file_read_iter+0x116e/0x1440 [ 643.651410][T20848] new_sync_read+0x389/0x4f0 [ 643.655996][T20848] __vfs_read+0xb1/0xc0 [ 643.660154][T20848] integrity_kernel_read+0xa1/0xe0 [ 643.665263][T20848] ima_calc_file_hash_tfm+0x1b5/0x260 [ 643.670629][T20848] ? finish_task_switch+0x7b/0x260 [ 643.675724][T20848] ? __schedule+0x31e/0x690 [ 643.680211][T20848] ? preempt_schedule+0x30/0x40 [ 643.685044][T20848] ? preempt_schedule_common+0x37/0x90 [ 643.690486][T20848] ? preempt_schedule+0x30/0x40 [ 643.695333][T20848] ? ___preempt_schedule+0x16/0x20 [ 643.700787][T20848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.707029][T20848] ? debug_smp_processor_id+0x4c/0x172 [ 643.712485][T20848] ima_calc_file_hash+0x158/0xf40 [ 643.717499][T20848] ? audit_log_end+0xfe/0x240 [ 643.722158][T20848] ? integrity_audit_msg+0x233/0x270 [ 643.727420][T20848] ? is_bad_inode+0x32/0x40 [ 643.731918][T20848] ima_collect_measurement+0x3b1/0x3e0 [ 643.737381][T20848] process_measurement+0x9e3/0x1130 [ 643.742580][T20848] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.749154][T20848] ? __read_once_size.constprop.0+0x12/0x20 [ 643.754612][T20836] caif:caif_disconnect_client(): nothing to disconnect [ 643.755047][T20848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.768120][T20848] ? __rcu_read_unlock+0x66/0x3c0 [ 643.773160][T20848] ? __read_once_size.constprop.0+0x12/0x20 [ 643.779038][T20848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.785279][T20848] ? refcount_sub_and_test_checked+0xc8/0x190 [ 643.791336][T20848] ? refcount_dec_and_test_checked+0x2c/0x40 [ 643.797300][T20848] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.803536][T20848] ? apparmor_task_getsecid+0x6c/0x90 [ 643.808891][T20848] ima_file_check+0x7e/0xb0 [ 643.813381][T20848] path_openat+0xfaf/0x36e0 [ 643.817887][T20848] ? tomoyo_path_number_perm+0x359/0x3c0 [ 643.823524][T20848] ? __read_once_size+0x41/0xe0 [ 643.828363][T20848] do_filp_open+0x11e/0x1b0 [ 643.832858][T20848] ? __alloc_fd+0x2ef/0x3b0 [ 643.837351][T20848] do_sys_open+0x3b3/0x4f0 [ 643.841758][T20848] __x64_sys_open+0x55/0x70 [ 643.846246][T20848] do_syscall_64+0xcc/0x370 [ 643.850745][T20848] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 643.856632][T20848] RIP: 0033:0x45a849 [ 643.860530][T20848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.880124][T20848] RSP: 002b:00007fd5f252dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 643.888532][T20848] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a849 [ 643.896487][T20848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 643.904528][T20848] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 643.912488][T20848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd5f252e6d4 [ 643.920462][T20848] R13: 00000000004fdb9f R14: 00000000004dee38 R15: 00000000ffffffff [ 643.929850][T20848] Kernel Offset: disabled [ 643.934175][T20848] Rebooting in 86400 seconds..