[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.972979][ T26] audit: type=1800 audit(1572834050.463:25): pid=7031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 42.009410][ T26] audit: type=1800 audit(1572834050.463:26): pid=7031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 42.029716][ T26] audit: type=1800 audit(1572834050.463:27): pid=7031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts. 2019/11/04 02:21:01 fuzzer started 2019/11/04 02:21:03 dialing manager at 10.128.0.105:42255 2019/11/04 02:21:03 syscalls: 2553 2019/11/04 02:21:03 code coverage: enabled 2019/11/04 02:21:03 comparison tracing: enabled 2019/11/04 02:21:03 extra coverage: extra coverage is not supported by the kernel 2019/11/04 02:21:03 setuid sandbox: enabled 2019/11/04 02:21:03 namespace sandbox: enabled 2019/11/04 02:21:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 02:21:03 fault injection: enabled 2019/11/04 02:21:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 02:21:03 net packet injection: enabled 2019/11/04 02:21:03 net device setup: enabled 2019/11/04 02:21:03 concurrency sanitizer: enabled 2019/11/04 02:21:03 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 62.046541][ T7197] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/04 02:21:24 adding functions to KCSAN blacklist: 'ext4_free_inodes_count' 'inet_putpeer' 'get_wchan' 'tick_do_update_jiffies64' 'ext4_nonda_switch' 'mod_timer' '__skb_wait_for_more_packets' 'do_exit' 'mem_cgroup_select_victim_node' 'fasync_remove_entry' 'generic_permission' 'fsnotify' '__tcp_select_window' 'tick_nohz_idle_stop_tick' 'blk_mq_run_hw_queue' 'icmp_global_allow' 'ext4_has_free_clusters' 'ext4_es_lookup_extent' 'pid_update_inode' 'ktime_get_real_seconds' 'process_srcu' 'blk_stat_add' '__nf_ct_refresh_acct' 'do_nanosleep' '__ext4_new_inode' 'yama_ptracer_del' '__hrtimer_run_queues' '__splice_from_pipe' 'run_timer_softirq' 'update_defense_level' 'poll_schedule_timeout' 'page_counter_try_charge' 'inet6_csk_route_socket' 'sit_tunnel_xmit' 'ext4_free_inode' 'tcp_add_backlog' 'pvclock_gtod_notify' '__skb_recv_udp' 'skb_dequeue' 'snd_seq_prioq_cell_out' 'xas_find_marked' '__nf_conntrack_find_get' 'rcu_gp_fqs_check_wake' 'kauditd_thread' 'taskstats_exit' 'snapshot_refaults' '__snd_rawmidi_transmit_ack' '__mark_inode_dirty' 'pipe_poll' 'wbt_issue' 'generic_fillattr' 'task_dump_owner' 'p9_poll_workfn' 'ext4_da_write_end' 'tcp_chrono_stop' 'generic_write_end' 'tick_sched_do_timer' 'vm_area_dup' 'dd_has_work' 'file_update_time' 'ext4_mb_good_group' 'echo_char' 'ext4_mark_iloc_dirty' 'audit_log_start' 'find_next_bit' '__dev_queue_xmit' 'shmem_add_to_page_cache' 'install_new_memslots' 'rcu_gp_fqs_loop' 'lookup_fast' 'xas_clear_mark' 'copy_process' 'kvm_arch_vcpu_load' 'tomoyo_supervisor' 'blk_mq_sched_dispatch_requests' 'list_lru_count_one' 'blk_mq_get_request' 'tcp_poll' 'xprt_clear_locked' 'ip_finish_output2' 'do_syslog' '__delete_from_page_cache' 'n_tty_receive_buf_common' 'ktime_get_seconds' 'find_get_pages_range_tag' 'add_timer' 'ext4_xattr_get' 'do_signal_stop' 'pcpu_alloc' 'mm_update_next_owner' 'ep_poll' 'blk_mq_dispatch_rq_list' 02:25:53 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000000)={0x3, @sliced}) 02:25:53 executing program 1: syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.108313][ T7200] IPVS: ftp: loaded support on port[0] = 21 02:25:53 executing program 2: r0 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000500)}], 0x1) [ 345.276797][ T7200] chnl_net:caif_netlink_parms(): no params data found [ 345.311216][ T7203] IPVS: ftp: loaded support on port[0] = 21 [ 345.359875][ T7200] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.381091][ T7200] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.389562][ T7200] device bridge_slave_0 entered promiscuous mode [ 345.411119][ T7200] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.418204][ T7200] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.442745][ T7200] device bridge_slave_1 entered promiscuous mode [ 345.502290][ T7200] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 345.544790][ T7200] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.561438][ T7206] IPVS: ftp: loaded support on port[0] = 21 [ 345.608416][ T7200] team0: Port device team_slave_0 added [ 345.632627][ T7200] team0: Port device team_slave_1 added 02:25:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/83, 0x53}], 0x1) [ 345.671247][ T7203] chnl_net:caif_netlink_parms(): no params data found [ 345.763980][ T7200] device hsr_slave_0 entered promiscuous mode [ 345.811405][ T7200] device hsr_slave_1 entered promiscuous mode [ 345.915701][ T7209] IPVS: ftp: loaded support on port[0] = 21 02:25:54 executing program 4: r0 = io_uring_setup(0xa4, &(0x7f0000000080)) fcntl$setstatus(r0, 0x4, 0x2800) [ 346.031102][ T7203] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.042998][ T7203] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.083523][ T7203] device bridge_slave_0 entered promiscuous mode [ 346.226237][ T7203] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.242767][ T7203] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.271197][ T7203] device bridge_slave_1 entered promiscuous mode [ 346.315891][ T7206] chnl_net:caif_netlink_parms(): no params data found [ 346.444455][ T7203] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.564904][ T7203] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 346.671284][ T7236] IPVS: ftp: loaded support on port[0] = 21 [ 346.698643][ T7206] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.713566][ T7206] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.741696][ T7206] device bridge_slave_0 entered promiscuous mode [ 346.780923][ T7203] team0: Port device team_slave_0 added [ 346.791848][ T7203] team0: Port device team_slave_1 added [ 346.797783][ T7209] chnl_net:caif_netlink_parms(): no params data found [ 346.843360][ T7200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.850529][ T7206] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.858374][ T7206] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.894375][ T7206] device bridge_slave_1 entered promiscuous mode 02:25:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 347.062013][ T7206] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 347.134006][ T7203] device hsr_slave_0 entered promiscuous mode [ 347.194608][ T7203] device hsr_slave_1 entered promiscuous mode [ 347.234543][ T7203] debugfs: Directory 'hsr0' with parent '/' already present! [ 347.256070][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.281912][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.323458][ T7200] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.335514][ T7206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 347.480407][ T7209] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.487844][ T7209] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.522156][ T7209] device bridge_slave_0 entered promiscuous mode [ 347.596811][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.634918][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.701903][ T7239] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.708989][ T7239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 347.831751][ T7206] team0: Port device team_slave_0 added [ 347.847139][ T7241] IPVS: ftp: loaded support on port[0] = 21 [ 347.851515][ T7206] team0: Port device team_slave_1 added [ 347.859753][ T7209] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.874143][ T7209] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.925569][ T7209] device bridge_slave_1 entered promiscuous mode [ 347.992430][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.025410][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.074612][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.101534][ T7239] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.108670][ T7239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.182097][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 348.293668][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 348.418427][ T7206] device hsr_slave_0 entered promiscuous mode [ 348.464813][ T7206] device hsr_slave_1 entered promiscuous mode [ 348.544525][ T7206] debugfs: Directory 'hsr0' with parent '/' already present! [ 348.561270][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 348.581824][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.617426][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 348.666717][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.705965][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.725252][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.776419][ T7200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 348.811664][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.850742][ T7209] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 348.943744][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.968477][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.022054][ T7239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.042791][ T7209] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 349.182252][ T7200] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 349.224195][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 349.244635][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.277211][ T7203] 8021q: adding VLAN 0 to HW filter on device bond0 [ 349.345037][ T7209] team0: Port device team_slave_0 added [ 349.374402][ T7236] chnl_net:caif_netlink_parms(): no params data found [ 349.432797][ T7209] team0: Port device team_slave_1 added [ 349.577106][ T7203] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.621819][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.629829][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.864590][ T7209] device hsr_slave_0 entered promiscuous mode [ 349.901455][ T7209] device hsr_slave_1 entered promiscuous mode [ 349.941305][ T7209] debugfs: Directory 'hsr0' with parent '/' already present! [ 350.078893][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.122011][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.130831][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.138035][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.233715][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.291987][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.300783][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.307958][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.435197][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 350.521653][ T7241] chnl_net:caif_netlink_parms(): no params data found [ 350.756911][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.774912][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 350.837057][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 350.906946][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 02:25:59 executing program 0: [ 350.952739][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 350.998891][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.060680][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.120109][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.162015][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.201638][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.265877][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state 02:25:59 executing program 0: [ 351.311219][ T7236] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.332059][ T7236] device bridge_slave_0 entered promiscuous mode [ 351.362012][ T7236] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.431123][ T7236] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.439024][ T7236] device bridge_slave_1 entered promiscuous mode [ 351.580935][ T7203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:26:00 executing program 0: [ 351.621887][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.697968][ T7206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 351.759166][ T7241] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.831164][ T7241] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.885989][ T7241] device bridge_slave_0 entered promiscuous mode 02:26:00 executing program 0: [ 351.932425][ T7241] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.939511][ T7241] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.046591][ T7241] device bridge_slave_1 entered promiscuous mode [ 352.110533][ T7206] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.223255][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.252064][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.261939][ T7236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 352.295483][ T7203] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 352.382623][ T7236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:26:00 executing program 0: [ 352.428886][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 352.445854][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 352.536433][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.585598][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.657739][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.664896][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.725551][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.779373][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.837716][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.844859][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.915119][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 02:26:01 executing program 0: [ 352.979993][ T7206] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 353.101103][ T7206] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 353.136222][ T7241] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.178542][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.198587][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 353.256720][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 353.290539][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 353.317539][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 353.340033][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 02:26:01 executing program 0: [ 353.366975][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.422062][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.488125][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.521888][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.563123][ T7241] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.618533][ T7209] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.649083][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 353.665756][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 353.700696][ T7236] team0: Port device team_slave_0 added [ 353.719863][ T7209] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.747497][ T7206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 353.831007][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 353.838648][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 353.912983][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.959909][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.986863][ T7366] ceph: device name is missing path (no : separator in /dev/loop1) [ 354.008525][ T7241] team0: Port device team_slave_0 added [ 354.027890][ T7236] team0: Port device team_slave_1 added [ 354.046000][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 354.070569][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.090679][ T7366] ceph: device name is missing path (no : separator in /dev/loop1) [ 354.100797][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.107913][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.127503][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 354.156480][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.203434][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.210530][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state 02:26:02 executing program 1: [ 354.256343][ T7241] team0: Port device team_slave_1 added [ 354.301856][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.315958][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 354.347212][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 354.375526][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 354.391968][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.400967][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.431905][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.455476][ T7209] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 354.467055][ T7209] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 354.496291][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.511805][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.541793][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.550488][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.564292][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.573447][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 354.580986][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 02:26:03 executing program 2: [ 354.643667][ T7241] device hsr_slave_0 entered promiscuous mode [ 354.681526][ T7241] device hsr_slave_1 entered promiscuous mode [ 354.721104][ T7241] debugfs: Directory 'hsr0' with parent '/' already present! [ 354.734379][ T7209] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 354.804154][ T7236] device hsr_slave_0 entered promiscuous mode [ 354.841537][ T7236] device hsr_slave_1 entered promiscuous mode [ 354.891245][ T7236] debugfs: Directory 'hsr0' with parent '/' already present! [ 354.899049][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 355.363752][ T7236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.424428][ T7241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.491954][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.516424][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 02:26:04 executing program 3: [ 355.559000][ T7236] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.587225][ T7241] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.685470][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.712506][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.720405][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.811875][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.820392][ T7299] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.827477][ T7299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.971554][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.979787][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.022777][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.081718][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.088887][ T7235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.167492][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.231807][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.240366][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.247532][ T7235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.361997][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.411591][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.461682][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.470237][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.477362][ T7235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.561825][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.611242][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.682440][ T7236] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 356.731167][ T7236] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.792592][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.800780][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.852600][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.901828][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.941176][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.950043][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 357.032328][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.071392][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.080435][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.142131][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.181401][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.190193][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.271815][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.280603][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.321952][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.361243][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.370229][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.451914][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.464691][ T7241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 357.512159][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 357.520663][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 357.572439][ T7299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 357.590992][ T7241] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.659349][ T7236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.711252][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 357.718832][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 357.765803][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 357.831353][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 358.241255][ C0] hrtimer: interrupt took 33036 ns 02:26:07 executing program 4: [ 359.052993][ T7459] overlayfs: failed to resolve 'file0': -2 [ 359.100564][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 359.100587][ T26] audit: type=1800 audit(1572834367.583:31): pid=7457 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="overlay" ino=28243 res=0 [ 359.100820][ T7457] syz-executor.5 (7457) used greatest stack depth: 9648 bytes left 02:26:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:07 executing program 1: 02:26:07 executing program 0: 02:26:07 executing program 2: 02:26:07 executing program 3: 02:26:07 executing program 4: 02:26:08 executing program 1: 02:26:08 executing program 2: 02:26:08 executing program 4: 02:26:08 executing program 3: 02:26:08 executing program 0: 02:26:08 executing program 4: 02:26:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:09 executing program 2: 02:26:09 executing program 1: 02:26:09 executing program 3: 02:26:09 executing program 0: 02:26:09 executing program 4: [ 360.480319][ T7482] syz-executor.5 (7482) used greatest stack depth: 9616 bytes left 02:26:09 executing program 3: 02:26:09 executing program 1: 02:26:09 executing program 4: 02:26:09 executing program 0: 02:26:09 executing program 2: 02:26:09 executing program 4: 02:26:09 executing program 1: 02:26:09 executing program 2: 02:26:09 executing program 3: 02:26:09 executing program 0: 02:26:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:09 executing program 4: 02:26:10 executing program 4: 02:26:10 executing program 3: 02:26:10 executing program 1: 02:26:10 executing program 0: 02:26:10 executing program 2: 02:26:10 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 02:26:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x4, 0xffffffffffffffff, 0x80ffff}) 02:26:10 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$getflags(r0, 0x1) 02:26:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x8000000000000003}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x5, &(0x7f0000000040)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff3, &(0x7f000062b000)=""/4083, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff5e}, 0x70) 02:26:10 executing program 1: semop(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r5, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78e, 0x0, @perf_bp={&(0x7f00000002c0), 0x17}, 0x12400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r6, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="02002bbd7000fcdbdf250b0000003c0008000700010100000800080044850000080008002000000008000600050000000800060067ffffff08000e004e200000080005000000000008000600ffffffff"], 0x60}, 0x1, 0x0, 0x0, 0x40008001}, 0x40800) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0xa, &(0x7f0000000a40)=[{&(0x7f00000005c0)="a5350ba2415fb8be98f2ed96ed687abfa2f48fd846c6630a626103075398a7fd4f18f16f12a8487c33dd4c6233db2be2b1f670738c9ade92fdb22ab3433691c2e5511cf59a7955b4581ff30277496c9b05915cd53316ed92925e52cf1b19a36d8d2a5a8af7fb7fcb4597853b18ff2f0212f460f6b30831de9192358a4282082bc3b66a7daff71d62c6153339c6d1da0fa3bd4a8dde1a3757f7556e8ddb3c46b05875fc86e042139351", 0xa9}, {&(0x7f0000000680)="9616907a0b189374797b539e875b5b0f", 0x10, 0xff}, {&(0x7f00000006c0)="1c6e3d9f815163bf2bd7e384e9a0a325ee996c43d470c41e184e527dfd0e60266df4b314d8c469df5559102db62a8e108527b3f984d9789ed6a8885d3b0306417ae15019314a9111886e9baedcf101dc1cbb0eefc4423444dfadf65f22a4ce63192568b3d5b3285022428e89675b5f98290a0d965e87958ed09f83d6a2a6c89941258b85d5b06bc83d6f0effa4b9c188443fe3fda650f32ff832ffc62126a74d50b3", 0xa2, 0x3}, {&(0x7f0000000780)="c072dd5097bef42c6eec07be0c1b6600d09077753f5cbab1026b41e057ed3d79ab410d64acf75487fbdec094bf00d584e3b3f9a9320bab6f3456131b782ec8757475a375f354079004a7091a40776480c2cf4a3662f433fd85139e6b1ca934b8167e0c47b8aa9d5669a5f4b356803b23e065bd24bca7c8a7672de2a4", 0x7c, 0x3ff}, {&(0x7f0000000800)="36327ac7d3fc258d0800000000", 0xd, 0x3f}, {&(0x7f0000000840)="7d9d", 0x2, 0x4}, {0x0, 0x0, 0x1ff}, {&(0x7f00000008c0)="c43894311401c77f15aef7322c48d26f03ac0d5930418ffcef16629c787465dc128359827833654373b8d4cf520fbd250803daf586ef533e24b3a694bbb428af6b78b7a5274c08fd9db68b042a0c3e9f5f34c711f7f488081b", 0x59, 0x6}, {&(0x7f0000000940)="e288e47d6f29c60e0c28d1e8f8fac46c0f0dd47ad493e7e307c21af03a36c34eb6311e436c5353997175c88606a99c486bfd4634fc8fafaece655a5881b1671891", 0x41, 0xfffffffffffffff8}, {&(0x7f0000000a00), 0x0, 0x8}], 0x4000000, &(0x7f0000000b40)=ANY=[@ANYBLOB='shortname=mixed,rodir,quiet,shortname=win95,measure,audat,ap`raisype=/{nodev,obj_role=/selinux/policy\x00,\x00']) fcntl$getownex(r4, 0x10, 0x0) [ 362.224394][ T7562] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 362.308613][ T7565] devpts: called with bogus options [ 362.533541][ T26] audit: type=1800 audit(1572834371.023:32): pid=7541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="overlay" ino=28479 res=0 [ 362.533612][ T7541] syz-executor.5 (7541) used greatest stack depth: 9552 bytes left 02:26:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00', 0x1000}) 02:26:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00') getdents64(r0, 0x0, 0x0) 02:26:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000002c0)=""/201, 0xc9}, 0x40000040) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000200)}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000000c0)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001140)="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", 0xeca, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f00000000c0)={0x4}) 02:26:11 executing program 1: getpgid(0xffffffffffffffff) pipe(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) symlink(0x0, &(0x7f00000002c0)='./file0\x00') r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$TCSETXF(r5, 0x5434, &(0x7f0000000000)={0x9, 0x8, [0x5, 0x80, 0x4, 0x0, 0xfeb]}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 02:26:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x4, 0xffffffffffffffff, 0x80ffff}) 02:26:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x4, 0xffffffffffffffff, 0x80ffff}) 02:26:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) [ 363.081580][ T26] audit: type=1804 audit(1572834371.573:33): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/4/bus" dev="sda1" ino=16552 res=1 02:26:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x3082}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d1070000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 02:26:11 executing program 1: getpgid(0xffffffffffffffff) pipe(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30}, 0x0) symlink(0x0, &(0x7f00000002c0)='./file0\x00') r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$TCSETXF(r5, 0x5434, &(0x7f0000000000)={0x9, 0x8, [0x5, 0x80, 0x4, 0x0, 0xfeb]}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 02:26:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, 0x1e, 0x20000001, 0x0, 0x0, {0xa}, [@typed={0x8, 0x2, @uid}]}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 363.610831][ T26] audit: type=1804 audit(1572834372.093:34): pid=7612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/5/bus" dev="sda1" ino=16575 res=1 02:26:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x3082}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7d1}, 0x1c) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000080)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d1070000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 02:26:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, &(0x7f00000002c0)=""/201, 0xc9}, 0x40000040) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000200)}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000000c0)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001140)="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", 0xeca, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f00000000c0)={0x4}) 02:26:12 executing program 1: 02:26:12 executing program 4: [ 364.080554][ T26] audit: type=1804 audit(1572834372.563:35): pid=7626 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/6/bus" dev="sda1" ino=16564 res=1 02:26:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000040)={'syz0', "b81e06539d8e485c27a5baf55e273cac03bb4674c26a014bf523e8aa9964c9e3d473791d79dfb3bfe8ef"}, 0x2e) 02:26:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:12 executing program 2: io_setup(0x3, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x2, 0x8000000000002b9, &(0x7f0000d83f60), 0x0) r1 = memfd_create(&(0x7f0000000140)='sec]ritynodev:ppp1bdev\x00', 0x0) io_submit(r0, 0xd8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 02:26:12 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) 02:26:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 02:26:13 executing program 3: 02:26:13 executing program 0: 02:26:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:13 executing program 0: 02:26:13 executing program 2: 02:26:13 executing program 4: 02:26:13 executing program 3: 02:26:13 executing program 0: 02:26:13 executing program 4: 02:26:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:16 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) 02:26:16 executing program 2: 02:26:16 executing program 3: 02:26:16 executing program 0: 02:26:16 executing program 4: 02:26:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) ftruncate(0xffffffffffffffff, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, 0x4002011, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 02:26:16 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000340)=' ', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x74, &(0x7f0000000080), 0x21a}, 0x0) 02:26:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',cache=n']) 02:26:16 executing program 3: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) 02:26:16 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) 02:26:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) ftruncate(0xffffffffffffffff, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 368.371983][ T7697] debugfs: Directory '7697-4' with parent 'kvm' already present! [ 368.451360][ T7710] 9p: Unknown Cache mode n 02:26:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, 0x4002011, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 02:26:17 executing program 2: 02:26:17 executing program 4: 02:26:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) ftruncate(0xffffffffffffffff, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:17 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r1 = dup(r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) remap_file_pages(&(0x7f00001e3000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) execveat(r1, &(0x7f00000000c0)='\x00', &(0x7f0000000140), 0x0, 0x1000) socket$inet6(0xa, 0x80000, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 02:26:17 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300090a0000002dbd700000000000030006000000000002000000e0000009000000000000000002000100000000000000000200000000030005000000000002000000e000000100000000000000004898df0d25999db2d2e0993af891e396a711b44841e4524780c5f86d1e8cbfad14806d043c56617e797a7ac745d3d2671844bc67b8f83e0eff91937338f5648242"], 0x50}}, 0x0) 02:26:17 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="d6f8fffd0500000002"], 0x9}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0xfffffffffffffffd) 02:26:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:17 executing program 0: syz_emit_ethernet(0x3a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaababb810000008100450000280000000000009078ac141400ac1423bb07029078000000000000000000000000000000004571de282600f9f876c2326c0a61a1809b5d90c621f5cd87596ecb0b09f0abcbd024f887a3b5e60f58b294a13eaaee6972e3be261be9af5539e6fff67e1e58ad429e08fcf99975f1b0e207420b352c3ddeac43d5bdb0bc1bd9a4019587f8fa6d9ab3b3668820cc647463"], 0x0) 02:26:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x2, 0x316, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x11, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000010100000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff02000000030000000000000000007663616e30000000000000000000000062726964676530000000000000000000736974300000000000000000000000007465616d300000000000000000000000aaaaaaaaaaaa000000000000aaaaaaeaaabb0000000000000000d8010000d801000010020000636f6d6d656e7400000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073746174697374696300000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa000000ffffffff009bfbffff0000000000000000007465616d5f736c6176655f310000000069726c616e300000750800000000000069726c616e3000e575dd73000000000073797a6b616c6c6572300000000000000180c2000000000000000000f646793b7b3900000000000000007000000070000000a8000000736e61740000"]}, 0x38e) ptrace$setopts(0x4206, r0, 0x0, 0xc) tkill(r0, 0x1a) wait4(0x0, 0x0, 0x0, 0x0) [ 369.729399][ T7734] mmap: syz-executor.3 (7734) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:26:19 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) 02:26:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00aG\x9f\xfak\x13{\xf0d\x12\x86\x99[\xe5\xf9@\xf7\x16\x9fG\x95\xa23\x87\v\xb6\xb9\xf4\xd6X?\x9e\xe72_4a\xc3', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fallocate(r1, 0x11, 0x0, 0x80008010000) 02:26:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:19 executing program 0: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x88, @multicast1, 0x0, 0x0, 'sh\x00\x15\x00\x00\x00\x00\x00\x00T\x00'}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\xff\xff', @ifru_flags}) 02:26:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x420400a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 02:26:19 executing program 3: mq_open(&(0x7f0000000000)='-lo)trusted$\x00', 0x62, 0x0, &(0x7f0000000040)={0x1f, 0xfe2, 0x7f, 0x100000001, 0xffffffffffff037d, 0x80000001, 0x8c0000000000000, 0x8}) 02:26:20 executing program 3: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) 02:26:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55515bdc50b38a3ebf3defb30f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0xfc85) socketpair$unix(0x1, 0x5, 0x0, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000001d80)=""/4096, 0x20011b6f}], 0x1) 02:26:20 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 02:26:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 371.951206][ T7801] Started in network mode 02:26:20 executing program 4: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000240)}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1f7d11114e5d6ed860136292289c000c3ce4b5fa700f83aea349a501b8f4926c960122bf81c40e3c4d0864b268fa71a491699d044621659396a16561ed76a41714dc23320c090feda54fb9d01dff1b216a98d40600000000000062cf0650e8ed90edad03061b9f03137ef0f339111118b25000f37489ef4238eec20fa85b476da7927e08b507114a00a8"], 0x0, 0x8a}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 371.992132][ T7801] Own node identity ac14140d, cluster identity 4711 [ 372.024406][ T7801] vcan0: MTU too low for tipc bearer [ 372.042012][ T2999] libceph: connect (1)[d::]:6789 error -101 [ 372.049887][ T7801] Enabling of bearer rejected, failed to enable media [ 372.062398][ T2999] libceph: mon0 (1)[d::]:6789 connect error 02:26:20 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b63c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c785255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab569f8e39808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd113acf060c105020d4882fc399eaabc787f0db64a0490b0f420326bcc4e2b65e7c6a1aeee7877a6274d908e5a5d512b87ed3eb24d40d331edbedf8a03a77cc2dfec4758b087c23cc9c5e726fea94249", @ANYRESHEX=0x0, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296c43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad03", @ANYRESDEC], 0x0, 0x141}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 372.108302][ T7812] ptrace attach of "/root/syz-executor.4"[7811] was attempted by "/root/syz-executor.4"[7812] [ 372.203464][ T7801] vcan0: MTU too low for tipc bearer [ 372.219097][ T7801] Enabling of bearer rejected, failed to enable media [ 372.247318][ T7817] ptrace attach of "/root/syz-executor.4"[7816] was attempted by "/root/syz-executor.4"[7817] 02:26:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfdbe) 02:26:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ppoll(&(0x7f0000000540)=[{r0}], 0x1, &(0x7f0000000580)={0x0, 0x989680}, 0x0, 0x0) 02:26:20 executing program 3: socket$inet6(0xa, 0x0, 0x0) unshare(0x20000) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') syz_genetlink_get_family_id$SEG6(0x0) setns(r0, 0x0) 02:26:20 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) mknod(0x0, 0x0, 0x0) open(0x0, 0x2, 0x0) r1 = dup(0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r3, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0x550dc4a64b72a34a) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xc4, 0x200}, 0x3200c, 0x0, 0x0, 0x0, 0x0, 0x377}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @initdev={0xac, 0x1e, 0x40, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x42, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x9, 0x5}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x40000, 0x4) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0xd000000, r6, 0x0, 0x8}) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f0000000280)={0xba, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r2, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x400e64f, 0x7, 0x5, 0x4}, 0x10) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="a6ecefc59c83bfd7f9a69504dd129268e0954a8883c6ba5fb9819baaa13b35b121d5ee8640e721cf2a8f43bb69968254f6970f881bdd0cc824305a362ee680918ad2f29951ef742137480a9bebec3284163d4233c6407c304df54dfcd2ba6eef01dc3ec4d223e56e354dc97223ca1c3723741e5c729676a1c7f90a043d435120438b66d9b0b3384e773faf8b13760002d3dc082cfa8d8a352a1fa4f90338b9744e2c221fe9a9f91c6d31b540646490f960c8d17c6ce582eaeaca5833fb555315a9ac77a04cc2a1707f2ea0eea140ac2a6ce3c3a48e43e8a2c4f8de95b0fd3545e19d5dd11beb28e6ca4603710ccd8f2edf50d2e3d7cdb72b"], 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) [ 372.450572][ T7822] overlayfs: overlapping lowerdir path 02:26:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000bfdfdc)={0x14, 0x0, 0x10000001, 0x800000001}, 0x14}}, 0x0) 02:26:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 372.749462][ T7831] IPVS: ftp: loaded support on port[0] = 21 02:26:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}]}, 0x28}}, 0x0) 02:26:21 executing program 0: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 02:26:21 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000003c0)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @empty, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @mcast2, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 02:26:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_names\x00') pread64(r0, 0x0, 0x58, 0x10008001) [ 373.035464][ T7855] overlayfs: overlapping lowerdir path [ 373.112507][ T26] audit: type=1800 audit(1572834381.603:36): pid=7846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16624 res=0 [ 373.158280][ T7861] IPVS: ftp: loaded support on port[0] = 21 02:26:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:21 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f455c410600010005010d4da5"], 0xd) close(r2) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 02:26:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000000c0)="5193"}, 0x20) 02:26:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 02:26:21 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000014c0)={0x0, &(0x7f0000001400)=""/188, 0x100000, 0xbc, 0x8}, 0x20) 02:26:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:23 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r0) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 02:26:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r1) 02:26:23 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000014c0)={0x0, &(0x7f0000001400)=""/188, 0x0, 0xbc, 0x8}, 0x20) 02:26:23 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) mknod(0x0, 0x0, 0x0) open(0x0, 0x2, 0x0) r1 = dup(0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r3, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0x550dc4a64b72a34a) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xc4, 0x200}, 0x3200c, 0x0, 0x0, 0x0, 0x0, 0x377}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @initdev={0xac, 0x1e, 0x40, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x42, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x9, 0x5}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x40000, 0x4) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0xd000000, r6, 0x0, 0x8}) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f0000000280)={0xba, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r2, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040)={0x400e64f, 0x7, 0x5, 0x4}, 0x10) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="a6ecefc59c83bfd7f9a69504dd129268e0954a8883c6ba5fb9819baaa13b35b121d5ee8640e721cf2a8f43bb69968254f6970f881bdd0cc824305a362ee680918ad2f29951ef742137480a9bebec3284163d4233c6407c304df54dfcd2ba6eef01dc3ec4d223e56e354dc97223ca1c3723741e5c729676a1c7f90a043d435120438b66d9b0b3384e773faf8b13760002d3dc082cfa8d8a352a1fa4f90338b9744e2c221fe9a9f91c6d31b540646490f960c8d17c6ce582eaeaca5833fb555315a9ac77a04cc2a1707f2ea0eea140ac2a6ce3c3a48e43e8a2c4f8de95b0fd3545e19d5dd11beb28e6ca4603710ccd8f2edf50d2e3d7cdb72b"], 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) 02:26:23 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x4) timer_create(0x0, &(0x7f0000000800)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00), 0x1000) timer_create(0x0, 0x0, &(0x7f00000009c0)) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) socketpair(0x9, 0x1, 0x81, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x3b, @multicast1, 0x4e24, 0x1, 'wlc\x00', 0x8, 0x0, 0x56}, 0x2c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) [ 375.176782][ T26] audit: type=1804 audit(1572834383.663:37): pid=7897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/19/bus" dev="sda1" ino=16623 res=1 [ 375.258351][ T7904] device nr0 entered promiscuous mode 02:26:23 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 02:26:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 375.476211][ T26] audit: type=1804 audit(1572834383.963:38): pid=7922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/20/bus" dev="sda1" ino=16643 res=1 02:26:24 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x4) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00), 0x1000) timer_create(0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r2, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 375.527343][ T7915] IPVS: ftp: loaded support on port[0] = 21 02:26:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 375.758079][ T26] audit: type=1804 audit(1572834384.243:39): pid=7931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/21/bus" dev="sda1" ino=16643 res=1 02:26:24 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00pva)I\xf1R\xe5\xfc-\xf1Q\xec\xdd\xc7j\xad') setns(r0, 0x40000000) 02:26:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:24 executing program 2: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semop(0x0, &(0x7f00000000c0)=[{0x0, 0x1000, 0x1000}], 0x1) setns(r0, 0x0) 02:26:24 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 02:26:24 executing program 1: 02:26:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 377.102042][ T7951] Dev loop4: unable to read RDB block 1 [ 377.126635][ T7951] loop4: unable to read partition table [ 377.142254][ T7951] loop4: partition table beyond EOD, truncated [ 377.211231][ T7951] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 378.543216][ T7951] Dev loop4: unable to read RDB block 1 [ 378.551160][ T7951] loop4: unable to read partition table [ 378.568242][ T7951] loop4: partition table beyond EOD, truncated [ 378.585614][ T7951] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:29 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x4) timer_create(0x0, &(0x7f0000000800)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00), 0x1000) timer_create(0x0, 0x0, &(0x7f00000009c0)) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) socketpair(0x9, 0x1, 0x81, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x3b, @multicast1, 0x4e24, 0x1, 'wlc\x00', 0x8, 0x0, 0x56}, 0x2c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) 02:26:29 executing program 1: 02:26:29 executing program 2: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') semop(0x0, &(0x7f00000000c0)=[{0x0, 0x1000, 0x1000}], 0x1) setns(r0, 0x0) 02:26:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:29 executing program 3: 02:26:29 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 02:26:29 executing program 1: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 02:26:29 executing program 2: 02:26:29 executing program 2: 02:26:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:29 executing program 3: 02:26:29 executing program 2: [ 381.723378][ T7992] Dev loop4: unable to read RDB block 1 [ 381.728992][ T7992] loop4: unable to read partition table [ 381.851347][ T7992] loop4: partition table beyond EOD, truncated [ 381.908282][ T7992] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 382.006702][ T7993] Dev loop1: unable to read RDB block 1 [ 382.055276][ T7993] loop1: unable to read partition table [ 382.060965][ T7993] loop1: partition table beyond EOD, truncated [ 382.085568][ T7993] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 02:26:32 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x10, 0x3, 0x4) timer_create(0x0, &(0x7f0000000800)={0x0, 0x38, 0x0, @tid=0xffffffffffffffff}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000a00), 0x1000) timer_create(0x0, 0x0, &(0x7f00000009c0)) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) socketpair(0x9, 0x1, 0x81, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x3b, @multicast1, 0x4e24, 0x1, 'wlc\x00', 0x8, 0x0, 0x56}, 0x2c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = accept4(r4, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) 02:26:33 executing program 3: 02:26:33 executing program 2: 02:26:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:33 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 02:26:33 executing program 1: 02:26:33 executing program 3: 02:26:33 executing program 1: 02:26:33 executing program 2: 02:26:33 executing program 3: 02:26:33 executing program 2: 02:26:33 executing program 1: [ 385.546111][ T8025] Dev loop4: unable to read RDB block 1 [ 385.551771][ T8025] loop4: unable to read partition table [ 385.557437][ T8025] loop4: partition table beyond EOD, truncated [ 385.621450][ T8025] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:35 executing program 0: 02:26:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:35 executing program 1: 02:26:35 executing program 3: 02:26:35 executing program 2: 02:26:35 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 02:26:36 executing program 1: 02:26:36 executing program 3: 02:26:36 executing program 2: 02:26:36 executing program 0: 02:26:36 executing program 1: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/wireless\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x40) 02:26:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:36 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) close(r2) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100), 0x10) 02:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv6_deladdr={0x34, 0x15, 0x682408e28cadce6d, 0x0, 0x0, {}, [@IFA_LOCAL={0xe, 0x2, @loopback}, @IFA_LOCAL={0x0, 0x2, @rand_addr="9025a54a369c4c343d770f56a63842d4"}]}, 0x34}}, 0x0) 02:26:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000300000042000000ff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) 02:26:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xcb8, 0x0, 0x1}, 0x3c) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0xfedb) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2b, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000d80)=[{0x0}, {&(0x7f0000000c00)}, {&(0x7f0000000c40)=""/8, 0x8}, {0x0}], 0x4, &(0x7f0000000dc0)=""/224, 0xe0}, 0x10000) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) r5 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80360000005e510befccd7", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r6 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd') 02:26:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 388.448696][ T8097] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 388.514612][ T8097] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 388.565118][ T8100] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 388.609644][ T8100] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 388.784230][ T8061] Dev loop4: unable to read RDB block 1 [ 388.789856][ T8061] loop4: unable to read partition table [ 388.805716][ T8061] loop4: partition table beyond EOD, truncated [ 388.837886][ T8061] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:38 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') 02:26:38 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:38 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) syz_open_dev$dmmidi(0x0, 0x9, 0x200000) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) socket(0x0, 0x0, 0x0) 02:26:38 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) tee(0xffffffffffffffff, r2, 0x0, 0xc) ftruncate(0xffffffffffffffff, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000040)={0x1}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000140)={[], 0x0, 0x676d52e98df06387}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180004331febe886d08004500001c0000000000"], 0x0) listen(r0, 0x20000000) socket$inet6(0xa, 0x6, 0x0) 02:26:38 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:38 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:38 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) syz_open_dev$dmmidi(0x0, 0x9, 0x200000) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r2, 0x0, 0x800000bf) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) socket(0x0, 0x0, 0x0) 02:26:38 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:38 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:38 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) [ 390.149570][ T8127] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 390.556861][ T8132] Dev loop4: unable to read RDB block 1 [ 390.574710][ T8132] loop4: unable to read partition table [ 390.623480][ T8132] loop4: partition table beyond EOD, truncated [ 390.657022][ T8132] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:39 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:39 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:39 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:39 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:39 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) tee(0xffffffffffffffff, r2, 0x0, 0xc) ftruncate(0xffffffffffffffff, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000040)={0x1}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000140)={[], 0x0, 0x676d52e98df06387}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180004331febe886d08004500001c0000000000"], 0x0) listen(r0, 0x20000000) socket$inet6(0xa, 0x6, 0x0) 02:26:40 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) tee(0xffffffffffffffff, r2, 0x0, 0xc) ftruncate(0xffffffffffffffff, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000001a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db500800000000000008f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047666865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000040)={0x1}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000140)={[], 0x0, 0x676d52e98df06387}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180004331febe886d08004500001c0000000000"], 0x0) listen(r0, 0x20000000) socket$inet6(0xa, 0x6, 0x0) 02:26:40 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:40 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:40 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 391.924780][ T8176] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:26:40 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 392.314594][ T8187] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 392.562828][ T8181] Dev loop4: unable to read RDB block 1 [ 392.598935][ T8181] loop4: unable to read partition table [ 392.605291][ T8181] loop4: partition table beyond EOD, truncated [ 392.616341][ T8181] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:41 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 02:26:41 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:41 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) tee(0xffffffffffffffff, r2, 0x0, 0xc) ftruncate(0xffffffffffffffff, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000001a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db500800000000000008f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047666865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000040)={0x1}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000140)={[], 0x0, 0x676d52e98df06387}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180004331febe886d08004500001c0000000000"], 0x0) listen(r0, 0x20000000) socket$inet6(0xa, 0x6, 0x0) 02:26:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:41 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:41 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x20) fcntl$setstatus(r0, 0x4, 0xc00) 02:26:42 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:42 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e37040001802f641700d1bd", 0x2e}], 0x1}, 0x0) [ 393.733181][ T8236] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 02:26:42 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:42 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) [ 393.818024][ T8220] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 02:26:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000000c0)=""/107) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000290007031dfffd946fa2830020200a0009000000067fffffffffffffff00ff", 0x23}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) [ 394.308057][ T8226] Dev loop4: unable to read RDB block 1 [ 394.391199][ T8226] loop4: unable to read partition table [ 394.428168][ T8226] loop4: partition table beyond EOD, truncated [ 394.476052][ T8226] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:43 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 02:26:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) timerfd_create(0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:43 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r3, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 394.886617][ T26] audit: type=1804 audit(1572834403.363:40): pid=8263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/34/bus" dev="sda1" ino=16746 res=1 02:26:43 executing program 1: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:43 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) timerfd_create(0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) timerfd_create(0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "085ded2266a7a7f98f97489f35fd324ff685f1d47a16c7b090e0a6fad94cb5c77570f7de6205269bf38b1cc19cae2efce375d2f6c75c966b205e6ed28f031e", 0x26}, 0x60) r5 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r5, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r5, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:43 executing program 1: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 395.403511][ T26] audit: type=1804 audit(1572834403.893:41): pid=8296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/35/bus" dev="sda1" ino=16746 res=1 [ 396.081709][ T8279] Dev loop4: unable to read RDB block 1 [ 396.087341][ T8279] loop4: unable to read partition table [ 396.093533][ T8279] loop4: partition table beyond EOD, truncated [ 396.121268][ T8279] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:44 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) 02:26:44 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:44 executing program 1: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) timerfd_create(0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) timerfd_create(0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "085ded2266a7a7f98f97489f35fd324ff685f1d47a16c7b090e0a6fad94cb5c77570f7de6205269bf38b1cc19cae2efce375d2f6c75c966b205e6ed28f031e", 0x26}, 0x60) r5 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r5, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r5, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 396.532628][ T26] audit: type=1804 audit(1572834405.023:42): pid=8337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/36/bus" dev="sda1" ino=16748 res=1 [ 396.658193][ T26] audit: type=1804 audit(1572834405.053:43): pid=8330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir334723883/syzkaller.HQ9sIZ/36/bus" dev="sda1" ino=16748 res=1 02:26:45 executing program 1: r0 = socket(0x0, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:45 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) dup2(r4, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) timerfd_create(0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "085ded2266a7a7f98f97489f35fd324ff685f1d47a16c7b090e0a6fad94cb5c77570f7de6205269bf38b1cc19cae2efce375d2f6c75c966b205e6ed28f031e", 0x26}, 0x60) r5 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r5, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r5, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:45 executing program 0: shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x7}, 0x28, 0x0) 02:26:45 executing program 1: r0 = socket(0x0, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 397.140110][ T8359] overlayfs: overlapping lowerdir path [ 397.576519][ T8375] Dev loop4: unable to read RDB block 1 [ 397.606939][ T8375] loop4: unable to read partition table [ 397.647940][ T8375] loop4: partition table beyond EOD, truncated [ 397.673279][ T8375] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:46 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:46 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:46 executing program 1: r0 = socket(0x0, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:46 executing program 0: shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x7}, 0x28, 0x0) 02:26:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, 0x0) [ 398.276220][ T8396] overlayfs: overlapping lowerdir path 02:26:46 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:46 executing program 1: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, 0x0) [ 398.737120][ T8426] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 398.816946][ T8429] overlayfs: overlapping lowerdir path 02:26:47 executing program 1: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 399.423218][ T8414] Dev loop4: unable to read RDB block 1 [ 399.428877][ T8414] loop4: unable to read partition table [ 399.437519][ T8414] loop4: partition table beyond EOD, truncated [ 399.461283][ T8414] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:48 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:48 executing program 1: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) r3 = dup(0xffffffffffffffff) dup2(r3, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r4, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 399.809010][ T8460] overlayfs: overlapping lowerdir path [ 399.851233][ T8464] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 400.285543][ T8484] overlayfs: overlapping lowerdir path 02:26:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:48 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 400.370640][ T8486] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 400.831754][ T8468] Dev loop4: unable to read RDB block 1 [ 400.837450][ T8468] loop4: unable to read partition table [ 400.847680][ T8468] loop4: partition table beyond EOD, truncated [ 400.854040][ T8468] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:49 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) r3 = dup(0xffffffffffffffff) dup2(r3, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r4, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 401.212212][ T8513] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 402.181926][ T8524] Dev loop4: unable to read RDB block 1 [ 402.189065][ T8524] loop4: unable to read partition table [ 402.195357][ T8524] loop4: partition table beyond EOD, truncated [ 402.211304][ T8524] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 02:26:50 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) r3 = dup(0xffffffffffffffff) dup2(r3, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(r4, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:51 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) [ 402.965359][ T8581] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:51 executing program 2: shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 02:26:52 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, 0x0}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:52 executing program 2: shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) [ 403.826058][ T8607] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, 0x0}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:52 executing program 2: shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) open(0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) [ 404.309322][ T8627] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, 0x0}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:53 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:53 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={0x0}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) timerfd_create(0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(r3, 0x21, 0xc, &(0x7f00000001c0)=""/14, 0x0) [ 405.197657][ T8655] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={0x0}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 02:26:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:53 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 02:26:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) timerfd_create(0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(r3, 0x21, 0xc, &(0x7f00000001c0)=""/14, 0x0) [ 405.716174][ T8680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 405.749997][ T8681] overlayfs: missing 'lowerdir' 02:26:54 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:54 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={0x0}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:54 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 02:26:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 406.525613][ T8703] overlayfs: missing 'lowerdir' [ 406.571726][ T8708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 02:26:55 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:55 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 406.974187][ T8725] overlayfs: missing 'lowerdir' [ 406.977782][ T8713] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 407.041548][ T8713] CPU: 1 PID: 8713 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 407.049417][ T8713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.059482][ T8713] Call Trace: [ 407.062801][ T8713] dump_stack+0xf5/0x159 [ 407.067611][ T8713] dump_header+0xaa/0x449 [ 407.072058][ T8713] oom_kill_process.cold+0x10/0x15 [ 407.077209][ T8713] out_of_memory+0x231/0xa00 [ 407.081853][ T8713] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 407.087510][ T8713] mem_cgroup_out_of_memory+0x128/0x150 [ 407.093078][ T8713] try_charge+0xb3a/0xbc0 [ 407.097448][ T8713] ? rcu_note_context_switch+0x700/0x760 [ 407.103103][ T8713] mem_cgroup_try_charge+0xd2/0x260 [ 407.108317][ T8713] mem_cgroup_try_charge_delay+0x3a/0x80 [ 407.113972][ T8713] __handle_mm_fault+0x179a/0x2cb0 [ 407.119116][ T8713] handle_mm_fault+0x21b/0x530 [ 407.123909][ T8713] __get_user_pages+0x485/0x1160 [ 407.128975][ T8713] populate_vma_page_range+0xe6/0x100 [ 407.134380][ T8713] __mm_populate+0x168/0x2a0 [ 407.138991][ T8713] __x64_sys_mlockall+0x2e3/0x320 [ 407.144121][ T8713] do_syscall_64+0xcc/0x370 [ 407.148637][ T8713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 407.154546][ T8713] RIP: 0033:0x45a219 [ 407.158534][ T8713] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.178519][ T8713] RSP: 002b:00007f735a772c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 02:26:55 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 407.186983][ T8713] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 407.194970][ T8713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 407.203117][ T8713] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 407.211095][ T8713] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7736d4 [ 407.219085][ T8713] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff 02:26:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setresgid(0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "085ded2266a7a7f98f97489f35fd324ff685f1d47a16c7b090e0a6fad94cb5c77570f7de6205269bf38b1cc19cae2efce375d2f6c75c966b205e6ed28f031e"}, 0x60) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 407.259197][ T8729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 407.283887][ T8713] memory: usage 307200kB, limit 307200kB, failcnt 45 [ 407.321134][ T8713] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 407.328185][ T8713] Memory cgroup stats for /syz4: [ 407.328505][ T8713] anon 310603776 [ 407.328505][ T8713] file 0 [ 407.328505][ T8713] kernel_stack 331776 [ 407.328505][ T8713] slab 405504 [ 407.328505][ T8713] sock 0 [ 407.328505][ T8713] shmem 0 [ 407.328505][ T8713] file_mapped 0 [ 407.328505][ T8713] file_dirty 0 [ 407.328505][ T8713] file_writeback 0 [ 407.328505][ T8713] anon_thp 274726912 [ 407.328505][ T8713] inactive_anon 137166848 [ 407.328505][ T8713] active_anon 4497408 [ 407.328505][ T8713] inactive_file 0 [ 407.328505][ T8713] active_file 0 [ 407.328505][ T8713] unevictable 168648704 [ 407.328505][ T8713] slab_reclaimable 0 [ 407.328505][ T8713] slab_unreclaimable 405504 [ 407.328505][ T8713] pgfault 20889 [ 407.328505][ T8713] pgmajfault 0 [ 407.328505][ T8713] workingset_refault 0 [ 407.328505][ T8713] workingset_activate 0 [ 407.328505][ T8713] workingset_nodereclaim 0 [ 407.328505][ T8713] pgrefill 0 [ 407.328505][ T8713] pgscan 0 [ 407.328505][ T8713] pgsteal 0 [ 407.328505][ T8713] pgactivate 0 [ 407.464594][ T8713] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=7972,uid=0 [ 407.480305][ T8713] Memory cgroup out of memory: Killed process 7972 (syz-executor.4) total-vm:72848kB, anon-rss:18488kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:155648kB oom_score_adj:1000 [ 407.886368][ T8713] Dev loop4: unable to read RDB block 1 [ 407.895683][ T8713] loop4: unable to read partition table [ 407.925423][ T8713] loop4: partition table beyond EOD, truncated [ 407.946193][ T8713] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 408.305842][ T8742] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 408.316273][ T8742] CPU: 1 PID: 8742 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 408.324244][ T8742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.334302][ T8742] Call Trace: [ 408.337681][ T8742] dump_stack+0xf5/0x159 [ 408.341944][ T8742] dump_header+0xaa/0x449 [ 408.346368][ T8742] oom_kill_process.cold+0x10/0x15 [ 408.351497][ T8742] out_of_memory+0x231/0xa00 [ 408.356187][ T8742] ? __kcsan_check_watchpoint+0x90/0x180 [ 408.361950][ T8742] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 408.367604][ T8742] mem_cgroup_out_of_memory+0x128/0x150 [ 408.373179][ T8742] try_charge+0xb3a/0xbc0 [ 408.378226][ T8742] ? rcu_note_context_switch+0x700/0x760 [ 408.383891][ T8742] mem_cgroup_try_charge+0xd2/0x260 [ 408.389103][ T8742] mem_cgroup_try_charge_delay+0x3a/0x80 [ 408.394809][ T8742] wp_page_copy+0x322/0x1160 [ 408.399409][ T8742] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 408.405105][ T8742] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 408.410746][ T8742] do_wp_page+0x192/0x11f0 [ 408.415155][ T8742] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 408.420782][ T8742] __handle_mm_fault+0x1c07/0x2cb0 [ 408.425988][ T8742] handle_mm_fault+0x21b/0x530 [ 408.430767][ T8742] __get_user_pages+0x485/0x1160 [ 408.435752][ T8742] populate_vma_page_range+0xe6/0x100 [ 408.441156][ T8742] __mm_populate+0x168/0x2a0 [ 408.445774][ T8742] __x64_sys_mlockall+0x2e3/0x320 [ 408.450843][ T8742] do_syscall_64+0xcc/0x370 [ 408.455385][ T8742] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 408.461711][ T8742] RIP: 0033:0x45a219 [ 408.465654][ T8742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.485278][ T8742] RSP: 002b:00007f735a751c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 408.493712][ T8742] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 408.501702][ T8742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 408.509681][ T8742] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 408.517689][ T8742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7526d4 [ 408.525654][ T8742] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff [ 408.534963][ T8742] memory: usage 307200kB, limit 307200kB, failcnt 106 [ 408.542168][ T8742] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 408.549283][ T8742] Memory cgroup stats for /syz4: [ 408.550229][ T8742] anon 310382592 [ 408.550229][ T8742] file 0 [ 408.550229][ T8742] kernel_stack 331776 [ 408.550229][ T8742] slab 405504 [ 408.550229][ T8742] sock 0 [ 408.550229][ T8742] shmem 0 [ 408.550229][ T8742] file_mapped 0 [ 408.550229][ T8742] file_dirty 0 [ 408.550229][ T8742] file_writeback 0 [ 408.550229][ T8742] anon_thp 272629760 [ 408.550229][ T8742] inactive_anon 123576320 [ 408.550229][ T8742] active_anon 4497408 [ 408.550229][ T8742] inactive_file 0 [ 408.550229][ T8742] active_file 0 [ 408.550229][ T8742] unevictable 182378496 [ 408.550229][ T8742] slab_reclaimable 0 [ 408.550229][ T8742] slab_unreclaimable 405504 [ 408.550229][ T8742] pgfault 22176 [ 408.550229][ T8742] pgmajfault 0 [ 408.550229][ T8742] workingset_refault 0 [ 408.550229][ T8742] workingset_activate 0 [ 408.550229][ T8742] workingset_nodereclaim 0 [ 408.550229][ T8742] pgrefill 0 [ 408.550229][ T8742] pgscan 0 [ 408.550229][ T8742] pgsteal 0 [ 408.550229][ T8742] pgactivate 0 [ 408.645807][ T8742] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8709,uid=0 [ 408.662342][ T8742] Memory cgroup out of memory: Killed process 8709 (syz-executor.4) total-vm:72716kB, anon-rss:18352kB, file-rss:54340kB, shmem-rss:0kB, UID:0 pgtables:196608kB oom_score_adj:1000 [ 408.682636][ T1063] oom_reaper: reaped process 8709 (syz-executor.4), now anon-rss:18352kB, file-rss:54336kB, shmem-rss:0kB 02:26:57 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:26:57 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:26:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:26:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:26:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setresgid(0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "085ded2266a7a7f98f97489f35fd324ff685f1d47a16c7b090e0a6fad94cb5c77570f7de6205269bf38b1cc19cae2efce375d2f6c75c966b205e6ed28f031e"}, 0x60) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 409.486796][ T8762] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:26:58 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 409.741280][ T8767] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 409.777228][ T8767] CPU: 0 PID: 8767 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 409.785089][ T8767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.795154][ T8767] Call Trace: [ 409.798538][ T8767] dump_stack+0xf5/0x159 [ 409.802829][ T8767] dump_header+0xaa/0x449 [ 409.807193][ T8767] oom_kill_process.cold+0x10/0x15 [ 409.812387][ T8767] out_of_memory+0x231/0xa00 [ 409.817053][ T8767] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 409.822751][ T8767] mem_cgroup_out_of_memory+0x128/0x150 [ 409.828394][ T8767] try_charge+0xb3a/0xbc0 [ 409.832785][ T8767] ? rcu_note_context_switch+0x700/0x760 [ 409.838544][ T8767] mem_cgroup_try_charge+0xd2/0x260 [ 409.844820][ T8767] mem_cgroup_try_charge_delay+0x3a/0x80 [ 409.850473][ T8767] __handle_mm_fault+0x179a/0x2cb0 [ 409.855624][ T8767] handle_mm_fault+0x21b/0x530 [ 409.860439][ T8767] __get_user_pages+0x485/0x1160 [ 409.865509][ T8767] populate_vma_page_range+0xe6/0x100 [ 409.871057][ T8767] __mm_populate+0x168/0x2a0 [ 409.875683][ T8767] __x64_sys_mlockall+0x2e3/0x320 [ 409.880736][ T8767] do_syscall_64+0xcc/0x370 [ 409.885350][ T8767] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 409.891321][ T8767] RIP: 0033:0x45a219 [ 409.895263][ T8767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.914888][ T8767] RSP: 002b:00007f735a772c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 409.923446][ T8767] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 409.931426][ T8767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:26:58 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:26:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 409.939503][ T8767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 409.947541][ T8767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7736d4 [ 409.955593][ T8767] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff 02:26:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = dup(r3) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x122240, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setresgid(0x0, 0x0, 0x0) timerfd_create(0x0, 0x0) bind$nfc_llcp(r4, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x7, 0x0, "085ded2266a7a7f98f97489f35fd324ff685f1d47a16c7b090e0a6fad94cb5c77570f7de6205269bf38b1cc19cae2efce375d2f6c75c966b205e6ed28f031e"}, 0x60) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) [ 410.071657][ T8777] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 410.080960][ T8767] memory: usage 307200kB, limit 307200kB, failcnt 122 [ 410.107595][ T8767] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 410.134423][ T8767] Memory cgroup stats for /syz4: [ 410.134722][ T8767] anon 310538240 [ 410.134722][ T8767] file 0 [ 410.134722][ T8767] kernel_stack 331776 [ 410.134722][ T8767] slab 405504 [ 410.134722][ T8767] sock 0 [ 410.134722][ T8767] shmem 0 [ 410.134722][ T8767] file_mapped 0 [ 410.134722][ T8767] file_dirty 0 [ 410.134722][ T8767] file_writeback 0 [ 410.134722][ T8767] anon_thp 272629760 [ 410.134722][ T8767] inactive_anon 137273344 [ 410.134722][ T8767] active_anon 4497408 [ 410.134722][ T8767] inactive_file 0 02:26:58 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 410.134722][ T8767] active_file 0 [ 410.134722][ T8767] unevictable 168947712 [ 410.134722][ T8767] slab_reclaimable 0 [ 410.134722][ T8767] slab_unreclaimable 405504 [ 410.134722][ T8767] pgfault 23034 [ 410.134722][ T8767] pgmajfault 0 [ 410.134722][ T8767] workingset_refault 0 [ 410.134722][ T8767] workingset_activate 0 [ 410.134722][ T8767] workingset_nodereclaim 0 [ 410.134722][ T8767] pgrefill 0 [ 410.134722][ T8767] pgscan 0 [ 410.134722][ T8767] pgsteal 0 [ 410.134722][ T8767] pgactivate 0 02:26:58 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 410.360879][ T8783] overlayfs: missing 'lowerdir' [ 410.399288][ T8767] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8744,uid=0 [ 410.458003][ T8767] Memory cgroup out of memory: Killed process 8744 (syz-executor.4) total-vm:72716kB, anon-rss:18356kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:155648kB oom_score_adj:1000 [ 410.803683][ T1063] oom_reaper: reaped process 8744 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 411.011778][ T8767] Dev loop4: unable to read RDB block 1 [ 411.017433][ T8767] loop4: unable to read partition table [ 411.027965][ T8767] loop4: partition table beyond EOD, truncated [ 411.034305][ T8767] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 411.314001][ T8802] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 411.324506][ T8802] CPU: 0 PID: 8802 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 411.332392][ T8802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.342525][ T8802] Call Trace: [ 411.345837][ T8802] dump_stack+0xf5/0x159 [ 411.350089][ T8802] dump_header+0xaa/0x449 [ 411.354431][ T8802] oom_kill_process.cold+0x10/0x15 [ 411.359593][ T8802] out_of_memory+0x231/0xa00 [ 411.364189][ T8802] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 411.369828][ T8802] mem_cgroup_out_of_memory+0x128/0x150 [ 411.375384][ T8802] try_charge+0xb3a/0xbc0 [ 411.379791][ T8802] ? rcu_note_context_switch+0x700/0x760 [ 411.385437][ T8802] mem_cgroup_try_charge+0xd2/0x260 [ 411.390753][ T8802] mem_cgroup_try_charge_delay+0x3a/0x80 [ 411.396383][ T8802] wp_page_copy+0x322/0x1160 [ 411.401057][ T8802] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 411.406709][ T8802] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 411.412382][ T8802] do_wp_page+0x192/0x11f0 [ 411.416785][ T8802] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 411.422538][ T8802] __handle_mm_fault+0x1c07/0x2cb0 [ 411.427648][ T8802] handle_mm_fault+0x21b/0x530 [ 411.432533][ T8802] __get_user_pages+0x485/0x1160 [ 411.437543][ T8802] populate_vma_page_range+0xe6/0x100 [ 411.442932][ T8802] __mm_populate+0x168/0x2a0 [ 411.447521][ T8802] __x64_sys_mlockall+0x2e3/0x320 [ 411.452610][ T8802] do_syscall_64+0xcc/0x370 [ 411.457143][ T8802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 411.463018][ T8802] RIP: 0033:0x45a219 [ 411.466996][ T8802] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.486599][ T8802] RSP: 002b:00007f735a751c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 411.494998][ T8802] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 411.502958][ T8802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 411.510914][ T8802] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 411.518921][ T8802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7526d4 [ 411.526993][ T8802] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff [ 411.539388][ T8802] memory: usage 307200kB, limit 307200kB, failcnt 186 [ 411.546624][ T8802] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 411.554158][ T8802] Memory cgroup stats for /syz4: [ 411.555701][ T8802] anon 310349824 [ 411.555701][ T8802] file 0 [ 411.555701][ T8802] kernel_stack 331776 [ 411.555701][ T8802] slab 405504 [ 411.555701][ T8802] sock 0 [ 411.555701][ T8802] shmem 0 [ 411.555701][ T8802] file_mapped 0 [ 411.555701][ T8802] file_dirty 0 [ 411.555701][ T8802] file_writeback 0 [ 411.555701][ T8802] anon_thp 272629760 [ 411.555701][ T8802] inactive_anon 123428864 [ 411.555701][ T8802] active_anon 4497408 [ 411.555701][ T8802] inactive_file 0 [ 411.555701][ T8802] active_file 0 [ 411.555701][ T8802] unevictable 182374400 [ 411.555701][ T8802] slab_reclaimable 0 [ 411.555701][ T8802] slab_unreclaimable 405504 [ 411.555701][ T8802] pgfault 24288 [ 411.555701][ T8802] pgmajfault 0 [ 411.555701][ T8802] workingset_refault 0 [ 411.555701][ T8802] workingset_activate 0 [ 411.555701][ T8802] workingset_nodereclaim 0 [ 411.555701][ T8802] pgrefill 0 [ 411.555701][ T8802] pgscan 0 [ 411.555701][ T8802] pgsteal 0 [ 411.555701][ T8802] pgactivate 0 [ 411.658106][ T8802] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8766,uid=0 [ 411.677162][ T8802] Memory cgroup out of memory: Killed process 8766 (syz-executor.4) total-vm:72716kB, anon-rss:18352kB, file-rss:54340kB, shmem-rss:0kB, UID:0 pgtables:196608kB oom_score_adj:1000 [ 411.696591][ T1063] oom_reaper: reaped process 8766 (syz-executor.4), now anon-rss:18356kB, file-rss:54340kB, shmem-rss:0kB 02:27:00 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:27:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:27:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:27:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:27:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet(0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000400)) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f00000001c0)=""/14, &(0x7f0000000280)=0xe) 02:27:00 executing program 3: [ 412.500743][ T8816] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 412.580735][ T8810] overlayfs: missing 'lowerdir' 02:27:01 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) 02:27:01 executing program 3: 02:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:27:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) [ 412.777566][ T8824] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 412.793553][ T8824] CPU: 0 PID: 8824 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 412.801394][ T8824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.811468][ T8824] Call Trace: [ 412.814777][ T8824] dump_stack+0xf5/0x159 [ 412.819035][ T8824] dump_header+0xaa/0x449 [ 412.823456][ T8824] oom_kill_process.cold+0x10/0x15 [ 412.828620][ T8824] out_of_memory+0x231/0xa00 [ 412.833221][ T8824] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 412.838952][ T8824] mem_cgroup_out_of_memory+0x128/0x150 [ 412.844559][ T8824] try_charge+0xb3a/0xbc0 [ 412.848907][ T8824] ? rcu_note_context_switch+0x700/0x760 [ 412.854747][ T8824] mem_cgroup_try_charge+0xd2/0x260 [ 412.860088][ T8824] mem_cgroup_try_charge_delay+0x3a/0x80 [ 412.865731][ T8824] __handle_mm_fault+0x179a/0x2cb0 [ 412.870933][ T8824] handle_mm_fault+0x21b/0x530 [ 412.875809][ T8824] __get_user_pages+0x485/0x1160 [ 412.881004][ T8824] populate_vma_page_range+0xe6/0x100 [ 412.886448][ T8824] __mm_populate+0x168/0x2a0 [ 412.891063][ T8824] __x64_sys_mlockall+0x2e3/0x320 [ 412.896227][ T8824] do_syscall_64+0xcc/0x370 [ 412.900803][ T8824] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 412.906789][ T8824] RIP: 0033:0x45a219 [ 412.910770][ T8824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.930486][ T8824] RSP: 002b:00007f735a772c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 412.938987][ T8824] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 412.946970][ T8824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 412.954942][ T8824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 412.962917][ T8824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7736d4 [ 412.970899][ T8824] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff [ 413.059142][ T8828] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 413.168829][ T8834] overlayfs: missing 'lowerdir' 02:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:27:01 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) [ 413.196013][ T8824] memory: usage 307200kB, limit 307200kB, failcnt 223 [ 413.261266][ T8824] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 413.276382][ T8824] Memory cgroup stats for /syz4: [ 413.276710][ T8824] anon 310521856 [ 413.276710][ T8824] file 0 [ 413.276710][ T8824] kernel_stack 294912 [ 413.276710][ T8824] slab 405504 [ 413.276710][ T8824] sock 0 [ 413.276710][ T8824] shmem 0 [ 413.276710][ T8824] file_mapped 0 [ 413.276710][ T8824] file_dirty 0 [ 413.276710][ T8824] file_writeback 0 [ 413.276710][ T8824] anon_thp 272629760 [ 413.276710][ T8824] inactive_anon 137121792 [ 413.276710][ T8824] active_anon 4632576 [ 413.276710][ T8824] inactive_file 0 [ 413.276710][ T8824] active_file 0 [ 413.276710][ T8824] unevictable 169046016 [ 413.276710][ T8824] slab_reclaimable 0 [ 413.276710][ T8824] slab_unreclaimable 405504 [ 413.276710][ T8824] pgfault 25146 [ 413.276710][ T8824] pgmajfault 0 [ 413.276710][ T8824] workingset_refault 0 [ 413.276710][ T8824] workingset_activate 0 [ 413.276710][ T8824] workingset_nodereclaim 0 [ 413.276710][ T8824] pgrefill 0 [ 413.276710][ T8824] pgscan 0 [ 413.276710][ T8824] pgsteal 0 [ 413.276710][ T8824] pgactivate 0 [ 413.403055][ T8839] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 413.550746][ T8824] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8803,uid=0 [ 413.570975][ T8824] Memory cgroup out of memory: Killed process 8803 (syz-executor.4) total-vm:72716kB, anon-rss:18356kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:155648kB oom_score_adj:1000 [ 413.607568][ T1063] oom_reaper: reaped process 8803 (syz-executor.4), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 413.837120][ T8824] Dev loop4: unable to read RDB block 1 [ 413.843861][ T8824] loop4: unable to read partition table [ 413.849627][ T8824] loop4: partition table beyond EOD, truncated [ 413.871424][ T8824] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 414.143187][ T8847] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 414.154261][ T8847] CPU: 0 PID: 8847 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 414.162528][ T8847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.172610][ T8847] Call Trace: [ 414.175977][ T8847] dump_stack+0xf5/0x159 [ 414.180233][ T8847] dump_header+0xaa/0x449 [ 414.184602][ T8847] oom_kill_process.cold+0x10/0x15 [ 414.189719][ T8847] out_of_memory+0x231/0xa00 [ 414.194395][ T8847] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 414.200038][ T8847] mem_cgroup_out_of_memory+0x128/0x150 [ 414.205608][ T8847] try_charge+0xb3a/0xbc0 [ 414.209974][ T8847] ? rcu_note_context_switch+0x700/0x760 [ 414.215673][ T8847] mem_cgroup_try_charge+0xd2/0x260 [ 414.221527][ T8847] mem_cgroup_try_charge_delay+0x3a/0x80 [ 414.227330][ T8847] wp_page_copy+0x322/0x1160 [ 414.232077][ T8847] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 414.237787][ T8847] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 414.243358][ T8847] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 414.249049][ T8847] do_wp_page+0x192/0x11f0 [ 414.253475][ T8847] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 414.259245][ T8847] __handle_mm_fault+0x1c07/0x2cb0 [ 414.264363][ T8847] handle_mm_fault+0x21b/0x530 [ 414.269138][ T8847] __get_user_pages+0x485/0x1160 [ 414.274126][ T8847] populate_vma_page_range+0xe6/0x100 [ 414.279615][ T8847] __mm_populate+0x168/0x2a0 [ 414.284241][ T8847] __x64_sys_mlockall+0x2e3/0x320 [ 414.289272][ T8847] do_syscall_64+0xcc/0x370 [ 414.293806][ T8847] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 414.299761][ T8847] RIP: 0033:0x45a219 [ 414.303653][ T8847] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.323301][ T8847] RSP: 002b:00007f735a751c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 414.331715][ T8847] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 414.339695][ T8847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 414.347807][ T8847] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 414.355804][ T8847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7526d4 [ 414.363817][ T8847] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff [ 414.373646][ T8847] memory: usage 307200kB, limit 307200kB, failcnt 280 [ 414.380680][ T8847] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 414.388585][ T8847] Memory cgroup stats for /syz4: [ 414.389686][ T8847] anon 310370304 [ 414.389686][ T8847] file 0 [ 414.389686][ T8847] kernel_stack 294912 [ 414.389686][ T8847] slab 405504 [ 414.389686][ T8847] sock 0 [ 414.389686][ T8847] shmem 0 [ 414.389686][ T8847] file_mapped 0 [ 414.389686][ T8847] file_dirty 0 [ 414.389686][ T8847] file_writeback 0 [ 414.389686][ T8847] anon_thp 272629760 [ 414.389686][ T8847] inactive_anon 123510784 [ 414.389686][ T8847] active_anon 4632576 [ 414.389686][ T8847] inactive_file 0 [ 414.389686][ T8847] active_file 0 [ 414.389686][ T8847] unevictable 182378496 [ 414.389686][ T8847] slab_reclaimable 0 [ 414.389686][ T8847] slab_unreclaimable 405504 [ 414.389686][ T8847] pgfault 26400 [ 414.389686][ T8847] pgmajfault 0 [ 414.389686][ T8847] workingset_refault 0 [ 414.389686][ T8847] workingset_activate 0 [ 414.389686][ T8847] workingset_nodereclaim 0 [ 414.389686][ T8847] pgrefill 0 [ 414.389686][ T8847] pgscan 0 [ 414.389686][ T8847] pgsteal 0 [ 414.389686][ T8847] pgactivate 0 [ 414.486954][ T8847] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8820,uid=0 [ 414.503343][ T8847] Memory cgroup out of memory: Killed process 8820 (syz-executor.4) total-vm:72716kB, anon-rss:18352kB, file-rss:54340kB, shmem-rss:0kB, UID:0 pgtables:196608kB oom_score_adj:1000 [ 414.524176][ T1063] oom_reaper: reaped process 8820 (syz-executor.4), now anon-rss:18352kB, file-rss:54336kB, shmem-rss:0kB 02:27:03 executing program 4: mlockall(0x3) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000440)=[{&(0x7f0000000140), 0x1d1, 0x100}, {&(0x7f0000000400)="547cab6ccf1d1b79209f6bd1218df7b3c0ac4979a400"/34, 0x22, 0x7}]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:27:03 executing program 2: 02:27:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:27:03 executing program 3: 02:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:27:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0xc000) [ 414.803366][ T8863] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:27:03 executing program 3: 02:27:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000005c80)={0x0, 0x0, &(0x7f0000005c40)={&(0x7f00000001c0)={0x14}, 0x4}}, 0x0) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0xc000) 02:27:03 executing program 2: 02:27:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="240000002d0007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:27:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) 02:27:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) [ 415.144699][ T8862] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 415.202313][ T8862] CPU: 1 PID: 8862 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 415.210170][ T8862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.220236][ T8862] Call Trace: [ 415.223602][ T8862] dump_stack+0xf5/0x159 [ 415.227971][ T8862] dump_header+0xaa/0x449 [ 415.232336][ T8862] oom_kill_process.cold+0x10/0x15 [ 415.237474][ T8862] out_of_memory+0x231/0xa00 [ 415.242120][ T8862] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 415.245316][ T8873] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 415.247884][ T8862] mem_cgroup_out_of_memory+0x128/0x150 [ 415.247931][ T8862] try_charge+0xb3a/0xbc0 [ 415.267032][ T8862] ? rcu_note_context_switch+0x700/0x760 [ 415.272725][ T8862] mem_cgroup_try_charge+0xd2/0x260 [ 415.277957][ T8862] mem_cgroup_try_charge_delay+0x3a/0x80 [ 415.283656][ T8862] __handle_mm_fault+0x179a/0x2cb0 [ 415.288844][ T8862] handle_mm_fault+0x21b/0x530 [ 415.293644][ T8862] __get_user_pages+0x485/0x1160 [ 415.298648][ T8862] populate_vma_page_range+0xe6/0x100 [ 415.304061][ T8862] __mm_populate+0x168/0x2a0 [ 415.308744][ T8862] __x64_sys_mlockall+0x2e3/0x320 [ 415.313798][ T8862] do_syscall_64+0xcc/0x370 [ 415.318392][ T8862] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 415.324297][ T8862] RIP: 0033:0x45a219 [ 415.328217][ T8862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.347922][ T8862] RSP: 002b:00007f735a772c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 415.356436][ T8862] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000045a219 [ 415.364447][ T8862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 415.372494][ T8862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 415.381517][ T8862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f735a7736d4 [ 415.389547][ T8862] R13: 00000000004c6c45 R14: 00000000004dc3c0 R15: 00000000ffffffff [ 415.456356][ T8880] overlayfs: missing 'lowerdir' [ 415.562823][ T8862] memory: usage 307200kB, limit 307200kB, failcnt 317 [ 415.569804][ T8862] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 415.579527][ T8862] Memory cgroup stats for /syz4: [ 415.580005][ T8862] anon 310329344 [ 415.580005][ T8862] file 0 [ 415.580005][ T8862] kernel_stack 331776 [ 415.580005][ T8862] slab 540672 [ 415.580005][ T8862] sock 0 [ 415.580005][ T8862] shmem 0 [ 415.580005][ T8862] file_mapped 0 [ 415.580005][ T8862] file_dirty 0 [ 415.580005][ T8862] file_writeback 0 [ 415.580005][ T8862] anon_thp 272629760 [ 415.580005][ T8862] inactive_anon 137121792 [ 415.580005][ T8862] active_anon 4632576 [ 415.580005][ T8862] inactive_file 0 [ 415.580005][ T8862] active_file 0 [ 415.580005][ T8862] unevictable 168718336 [ 415.580005][ T8862] slab_reclaimable 0 [ 415.580005][ T8862] slab_unreclaimable 540672 [ 415.580005][ T8862] pgfault 27291 [ 415.580005][ T8862] pgmajfault 0 [ 415.580005][ T8862] workingset_refault 0 [ 415.580005][ T8862] workingset_activate 0 [ 415.580005][ T8862] workingset_nodereclaim 0 [ 415.580005][ T8862] pgrefill 0 [ 415.580005][ T8862] pgscan 0 [ 415.580005][ T8862] pgsteal 0 [ 415.580005][ T8862] pgactivate 0 [ 415.706730][ T8862] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=8848,uid=0 [ 415.737251][ T8862] Memory cgroup out of memory: Killed process 8848 (syz-executor.4) total-vm:72716kB, anon-rss:18356kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:155648kB oom_score_adj:1000 [ 416.016166][ T8862] Dev loop4: unable to read RDB block 1 [ 416.034588][ T8862] loop4: unable to read partition table [ 416.057644][ T8862] loop4: partition table beyond EOD, truncated [ 416.091338][ T8862] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 416.376956][ T8884] ================================================================== [ 416.385098][ T8884] BUG: KCSAN: data-race in vti_tunnel_xmit / vti_tunnel_xmit [ 416.392452][ T8884] [ 416.394780][ T8884] read to 0xffff8880ab6ed198 of 8 bytes by task 8881 on cpu 1: [ 416.402317][ T8884] vti_tunnel_xmit+0x461/0xa50 [ 416.407078][ T8884] dev_hard_start_xmit+0xef/0x430 [ 416.412088][ T8884] __dev_queue_xmit+0x14c9/0x1b60 [ 416.417104][ T8884] dev_queue_xmit+0x21/0x30 [ 416.421608][ T8884] neigh_direct_output+0x1f/0x30 [ 416.426561][ T8884] ip6_finish_output2+0x7a6/0xec0 [ 416.431597][ T8884] __ip6_finish_output+0x2d7/0x330 [ 416.436718][ T8884] ip6_finish_output+0x41/0x160 [ 416.441574][ T8884] ip6_output+0xf2/0x280 [ 416.445822][ T8884] ip6_local_out+0x74/0x90 [ 416.450237][ T8884] ip6_send_skb+0x53/0x110 [ 416.454647][ T8884] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 416.460044][ T8884] udpv6_sendmsg+0x1906/0x1c20 [ 416.464813][ T8884] inet6_sendmsg+0x6d/0x90 [ 416.469217][ T8884] [ 416.471545][ T8884] write to 0xffff8880ab6ed198 of 8 bytes by task 8884 on cpu 0: [ 416.479527][ T8884] vti_tunnel_xmit+0x478/0xa50 [ 416.484292][ T8884] dev_hard_start_xmit+0xef/0x430 [ 416.489321][ T8884] __dev_queue_xmit+0x14c9/0x1b60 [ 416.494344][ T8884] dev_queue_xmit+0x21/0x30 [ 416.498846][ T8884] neigh_direct_output+0x1f/0x30 [ 416.503817][ T8884] ip6_finish_output2+0x7a6/0xec0 [ 416.508840][ T8884] __ip6_finish_output+0x2d7/0x330 [ 416.513948][ T8884] ip6_finish_output+0x41/0x160 [ 416.518799][ T8884] ip6_output+0xf2/0x280 [ 416.523042][ T8884] ip6_local_out+0x74/0x90 [ 416.527457][ T8884] ip6_send_skb+0x53/0x110 [ 416.531872][ T8884] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 416.537238][ T8884] udpv6_sendmsg+0x1906/0x1c20 [ 416.541989][ T8884] [ 416.544318][ T8884] Reported by Kernel Concurrency Sanitizer on: [ 416.550468][ T8884] CPU: 0 PID: 8884 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 416.558263][ T8884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.568312][ T8884] ================================================================== [ 416.576371][ T8884] Kernel panic - not syncing: panic_on_warn set ... [ 416.583133][ T8884] CPU: 0 PID: 8884 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 416.590944][ T8884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.601007][ T8884] Call Trace: [ 416.604326][ T8884] dump_stack+0xf5/0x159 [ 416.608586][ T8884] panic+0x210/0x640 [ 416.612499][ T8884] ? ip6_output+0xf2/0x280 [ 416.616916][ T8884] ? vprintk_func+0x8d/0x140 [ 416.617421][ T8886] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 416.621502][ T8884] kcsan_report.cold+0xc/0x10 [ 416.621522][ T8884] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 416.621540][ T8884] __tsan_write8+0x32/0x40 [ 416.621559][ T8884] vti_tunnel_xmit+0x478/0xa50 [ 416.621576][ T8884] ? skb_network_protocol+0xa9/0x2a0 [ 416.621602][ T8884] dev_hard_start_xmit+0xef/0x430 [ 416.621624][ T8884] __dev_queue_xmit+0x14c9/0x1b60 [ 416.621639][ T8884] ? __tsan_read1+0x2c/0x30 [ 416.621658][ T8884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 416.621693][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.682977][ T8884] dev_queue_xmit+0x21/0x30 [ 416.687481][ T8884] neigh_direct_output+0x1f/0x30 [ 416.692437][ T8884] ip6_finish_output2+0x7a6/0xec0 [ 416.697465][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.703096][ T8884] ? nf_confirm+0x224/0x2b0 [ 416.707607][ T8884] __ip6_finish_output+0x2d7/0x330 [ 416.712725][ T8884] ip6_finish_output+0x41/0x160 [ 416.717620][ T8884] ip6_output+0xf2/0x280 [ 416.721897][ T8884] ? __ip6_finish_output+0x330/0x330 [ 416.727193][ T8884] ip6_local_out+0x74/0x90 [ 416.731799][ T8884] ip6_send_skb+0x53/0x110 [ 416.736221][ T8884] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 416.741601][ T8884] udpv6_sendmsg+0x1906/0x1c20 [ 416.746396][ T8884] ? __perf_event_task_sched_in+0x14d/0x390 [ 416.752298][ T8884] ? ip_reply_glue_bits+0xb0/0xb0 [ 416.757334][ T8884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.763590][ T8884] ? debug_smp_processor_id+0x4c/0x172 [ 416.769047][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.774778][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.781047][ T8884] inet6_sendmsg+0x6d/0x90 [ 416.785465][ T8884] ? inet6_sendmsg+0x6d/0x90 [ 416.790057][ T8884] ? inet6_ioctl+0x140/0x140 [ 416.794647][ T8884] sock_sendmsg+0x9f/0xc0 [ 416.798980][ T8884] ___sys_sendmsg+0x2b7/0x5d0 [ 416.803659][ T8884] ? __rcu_read_unlock+0x66/0x3c0 [ 416.808688][ T8884] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 416.814632][ T8884] ? __fget+0xb8/0x1d0 [ 416.818800][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.824437][ T8884] ? __fget_light+0xaf/0x190 [ 416.829026][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.834658][ T8884] ? __tsan_write4+0x32/0x40 [ 416.839268][ T8884] __sys_sendmmsg+0x123/0x350 [ 416.843951][ T8884] ? __tsan_read8+0x2c/0x30 [ 416.848455][ T8884] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 416.854172][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.859815][ T8884] ? _copy_to_user+0x84/0xb0 [ 416.864586][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.870225][ T8884] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 416.875874][ T8884] __x64_sys_sendmmsg+0x64/0x80 [ 416.880869][ T8884] do_syscall_64+0xcc/0x370 [ 416.885381][ T8884] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 416.892419][ T8884] RIP: 0033:0x45a219 [ 416.896320][ T8884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 416.915931][ T8884] RSP: 002b:00007fba9fc30c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 416.924346][ T8884] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a219 [ 416.932314][ T8884] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000004 [ 416.940280][ T8884] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 416.948261][ T8884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba9fc316d4 [ 416.956227][ T8884] R13: 00000000004c7fba R14: 00000000004de3e8 R15: 00000000ffffffff [ 416.965766][ T8884] Kernel Offset: disabled [ 416.970313][ T8884] Rebooting in 86400 seconds..