[ 71.329708][ T26] audit: type=1800 audit(1565457408.139:27): pid=10240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 71.392029][ T26] audit: type=1800 audit(1565457408.139:28): pid=10240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 72.067117][ T26] audit: type=1800 audit(1565457408.949:29): pid=10240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 72.087618][ T26] audit: type=1800 audit(1565457408.959:30): pid=10240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.121' (ECDSA) to the list of known hosts. 2019/08/10 17:16:58 fuzzer started 2019/08/10 17:17:01 dialing manager at 10.128.0.26:39593 2019/08/10 17:17:02 syscalls: 2487 2019/08/10 17:17:02 code coverage: enabled 2019/08/10 17:17:02 comparison tracing: enabled 2019/08/10 17:17:02 extra coverage: extra coverage is not supported by the kernel 2019/08/10 17:17:02 setuid sandbox: enabled 2019/08/10 17:17:02 namespace sandbox: enabled 2019/08/10 17:17:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/10 17:17:02 fault injection: enabled 2019/08/10 17:17:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/10 17:17:02 net packet injection: enabled 2019/08/10 17:17:02 net device setup: enabled 17:18:18 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fchdir(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='cmdline\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ftruncate(r1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 17:18:19 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140), 0x10) syzkaller login: [ 162.264445][T10410] IPVS: ftp: loaded support on port[0] = 21 [ 162.314322][T10412] IPVS: ftp: loaded support on port[0] = 21 17:18:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x10, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004550d, 0x0) [ 162.429745][T10410] chnl_net:caif_netlink_parms(): no params data found [ 162.521056][T10412] chnl_net:caif_netlink_parms(): no params data found [ 162.536503][T10410] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.545430][T10410] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.554447][T10410] device bridge_slave_0 entered promiscuous mode [ 162.576797][T10410] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.585956][T10410] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.603699][T10410] device bridge_slave_1 entered promiscuous mode 17:18:19 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r0, 0x800060c0045009, &(0x7f0000000040)) [ 162.625995][T10416] IPVS: ftp: loaded support on port[0] = 21 [ 162.645548][T10412] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.657882][T10412] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.666730][T10412] device bridge_slave_0 entered promiscuous mode [ 162.695441][T10410] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.706185][T10412] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.714533][T10412] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.729713][T10412] device bridge_slave_1 entered promiscuous mode [ 162.752987][T10410] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.840597][T10412] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.860695][T10410] team0: Port device team_slave_0 added [ 162.867645][T10410] team0: Port device team_slave_1 added 17:18:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0xa6}], 0x1, 0x0) [ 162.890607][T10412] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.935947][T10418] IPVS: ftp: loaded support on port[0] = 21 [ 162.946117][T10412] team0: Port device team_slave_0 added 17:18:19 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x6, 0x80000000}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f0000000240)) read$char_usb(r0, &(0x7f0000005000)=""/171, 0xab) [ 163.080719][T10410] device hsr_slave_0 entered promiscuous mode [ 163.128461][T10410] device hsr_slave_1 entered promiscuous mode [ 163.174720][T10412] team0: Port device team_slave_1 added [ 163.205878][T10420] IPVS: ftp: loaded support on port[0] = 21 [ 163.230219][T10412] device hsr_slave_0 entered promiscuous mode [ 163.288533][T10412] device hsr_slave_1 entered promiscuous mode [ 163.328224][T10412] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.346775][T10410] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.353901][T10410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.361291][T10410] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.368388][T10410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.401803][T10422] IPVS: ftp: loaded support on port[0] = 21 [ 163.406029][T10412] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.414842][T10412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.422215][T10412] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.429298][T10412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.450628][T10424] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.457941][T10424] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.465822][T10424] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.473323][T10424] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.499193][T10416] chnl_net:caif_netlink_parms(): no params data found [ 163.586293][T10416] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.593997][T10416] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.601762][T10416] device bridge_slave_0 entered promiscuous mode [ 163.611171][T10416] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.618482][T10416] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.626009][T10416] device bridge_slave_1 entered promiscuous mode [ 163.644825][T10416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.662640][T10416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.711121][T10416] team0: Port device team_slave_0 added [ 163.722494][T10416] team0: Port device team_slave_1 added [ 163.820385][T10416] device hsr_slave_0 entered promiscuous mode [ 163.868520][T10416] device hsr_slave_1 entered promiscuous mode [ 163.908227][T10416] debugfs: Directory 'hsr0' with parent '/' already present! [ 163.930699][T10410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.964553][T10422] chnl_net:caif_netlink_parms(): no params data found [ 164.006584][T10420] chnl_net:caif_netlink_parms(): no params data found [ 164.033652][T10412] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.041498][T10418] chnl_net:caif_netlink_parms(): no params data found [ 164.064386][T10416] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.071501][T10416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.078868][T10416] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.085932][T10416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.122186][T10420] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.129586][T10420] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.137098][T10420] device bridge_slave_0 entered promiscuous mode [ 164.152034][T10412] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.159588][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.166945][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.176124][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.183884][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.191714][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.199437][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.207042][T10422] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.214223][T10422] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.222131][T10422] device bridge_slave_0 entered promiscuous mode [ 164.231694][T10410] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.238872][T10420] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.245925][T10420] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.254558][T10420] device bridge_slave_1 entered promiscuous mode [ 164.289721][T10418] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.296894][T10418] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.306731][T10418] device bridge_slave_0 entered promiscuous mode [ 164.313997][T10422] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.321284][T10422] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.328945][T10422] device bridge_slave_1 entered promiscuous mode [ 164.337711][T10420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.351004][T10420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.369165][T10418] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.376264][T10418] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.384885][T10418] device bridge_slave_1 entered promiscuous mode [ 164.414263][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.423290][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.431744][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.438833][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.446859][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.455790][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.464360][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.471451][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.479377][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.487935][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.496401][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.503449][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.511426][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.519906][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.528268][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.535307][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.542973][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.551567][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.583929][T10422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.595143][T10422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.605346][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.615902][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.624571][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.632983][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.641515][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.650301][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.660265][T10418] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.672591][T10418] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.690593][T10420] team0: Port device team_slave_0 added [ 164.703801][T10418] team0: Port device team_slave_0 added [ 164.716511][T10418] team0: Port device team_slave_1 added [ 164.722259][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.731126][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.739176][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.747586][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.756020][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.764709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.777228][T10412] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 164.788021][T10412] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.802498][T10420] team0: Port device team_slave_1 added [ 164.817039][T10422] team0: Port device team_slave_0 added [ 164.824510][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.833950][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.842550][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.850886][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.860087][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.868597][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.876827][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.896974][T10422] team0: Port device team_slave_1 added [ 164.906612][T10410] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.919277][T10410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.980892][T10420] device hsr_slave_0 entered promiscuous mode [ 165.018687][T10420] device hsr_slave_1 entered promiscuous mode [ 165.058268][T10420] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.067712][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.076297][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.140937][T10418] device hsr_slave_0 entered promiscuous mode [ 165.178671][T10418] device hsr_slave_1 entered promiscuous mode [ 165.218222][T10418] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.235829][T10412] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.340676][T10422] device hsr_slave_0 entered promiscuous mode [ 165.388559][T10422] device hsr_slave_1 entered promiscuous mode [ 165.428375][T10422] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.468679][T10410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.483129][T10416] 8021q: adding VLAN 0 to HW filter on device bond0 17:18:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x840000000002, 0x0, 0x6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000), 0x4) [ 165.545818][T10416] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.587831][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.599376][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.615122][T10420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.628838][T10418] 8021q: adding VLAN 0 to HW filter on device bond0 17:18:22 executing program 1: [ 165.644183][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.653097][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.662464][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.669583][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 17:18:22 executing program 1: [ 165.715856][T10420] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.742165][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.763650][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:18:22 executing program 1: [ 165.787449][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.796540][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.809681][T10424] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.816783][T10424] bridge0: port 2(bridge_slave_1) entered forwarding state 17:18:22 executing program 1: 17:18:22 executing program 1: [ 165.837183][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.860839][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.887895][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.901861][T10422] 8021q: adding VLAN 0 to HW filter on device bond0 17:18:22 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fchdir(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='cmdline\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ftruncate(r1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 17:18:22 executing program 1: [ 165.933424][T10418] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.953022][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.971951][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.999446][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.007824][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.014935][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.041735][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.050771][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.062215][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.071927][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.083685][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.090785][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.102042][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.110919][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.128739][T10422] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.144682][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.152633][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.162975][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.170893][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.179241][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.188032][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.196552][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.204763][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.213213][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.221977][ T3491] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.229069][ T3491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.237080][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.248036][T10416] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.259387][T10416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.282303][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.290965][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.302697][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.311566][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.320030][ T3491] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.327055][ T3491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.334757][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.343203][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.352013][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.360421][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.369489][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.377931][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.386539][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.395243][ T3491] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.403860][ T3491] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.411097][ T3491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.426336][T10416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.444802][T10418] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.455371][T10418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.484594][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.492688][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.501792][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.511302][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.520468][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.529499][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.537671][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.546218][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.554629][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.563877][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.572375][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.580899][T10424] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.587922][T10424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.595612][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.604201][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.612949][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.620837][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.641301][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.650281][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.659053][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.667739][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.676310][T10424] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.694778][T10420] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.705959][T10420] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.724196][T10418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.732895][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.741593][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.754770][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.763175][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.771896][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.780375][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.789103][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.797391][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.805693][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.813811][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.822040][ T2795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.831899][T10422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.861148][T10422] 8021q: adding VLAN 0 to HW filter on device batadv0 17:18:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 166.913843][T10420] 8021q: adding VLAN 0 to HW filter on device batadv0 17:18:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) 17:18:24 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') 17:18:24 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)) 17:18:24 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 17:18:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11cba50d5e0bb0e67bf070") ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000400)=0x20d000000) 17:18:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x9, 0x400032, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000100)={{}, 'port0\x00'}) 17:18:24 executing program 0: mknod(&(0x7f0000000140)='./bus\x00', 0x8000, 0x4503) r0 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) close(r0) 17:18:24 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r0) dup3(r0, r1, 0x0) 17:18:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r0, 0x4000000000000) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x0, 0x2013, r0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040031, 0xffffffffffffffff, 0x0) 17:18:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) 17:18:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) 17:18:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x3ff}, {&(0x7f0000000000)=ANY=[@ANYBLOB="66078ee5fd9ab7f907181efe8d52618860563c7dc0bb0500000000fb9e"], 0x9c}], 0x1a8, 0x0, 0xfffffffffffffe82}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 167.431151][T10529] fuse: Bad value for 'subtype' 17:18:24 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r0 = getpgrp(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000a00)='/dev/vcsa#\x00', 0xce, 0x220040) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000a40)={0x800, 0x7, 0x8000, 0x4, 0x4, 0x9, 0x7, 0x5, 0x0}, &(0x7f0000000a80)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000ac0)={0x0, 0x3, 0x100000000, 0x0, r2}, 0x10) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, [0x0, 0x8, 0x6, 0x400, 0xffffffffffffff9e, 0x8, 0x0, 0x8, 0x200, 0x0, 0x3c, 0x0, 0xffffffffffffffe1, 0x20, 0x13]}, &(0x7f00000000c0)=0x100) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x26) setpriority(0x1, r0, 0x81) socket$pptp(0x18, 0x1, 0x2) ioctl$TIOCGPGRP(r3, 0x540f, 0x0) shmget$private(0x0, 0x3000, 0x8, &(0x7f0000ff9000/0x3000)=nil) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="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", 0x7f0, 0xfffffffffffffffd) 17:18:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x425, 0x0, 0x0, {{}, 0x0, 0x3, 0x0, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}}, 0x68}}, 0x0) 17:18:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3fe, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x47}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 167.529970][T10529] fuse: Bad value for 'subtype' 17:18:24 executing program 3: epoll_create1(0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 17:18:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 'syz0\x00'}) 17:18:24 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0xc0505510, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) [ 167.711975][ C0] hrtimer: interrupt took 25874 ns 17:18:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0xe520b7d930c704cc, 0x80, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = gettid() sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000400)="10", 0x1}], 0x1}, 0x0) tkill(r2, 0x14) 17:18:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) fdatasync(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) 17:18:24 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x2}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="f4", 0x1}], 0x1}, 0x0) 17:18:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {0x2}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 17:18:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x8, 0x0, 0x47}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 17:18:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cdd58e40ca36129a05bc000000"], 0xd}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) getpgid(0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x48000, 0x0) write$FUSE_IOCTL(r3, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000000)='net/ptype\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, 0x0) add_key(&(0x7f0000000340)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) write$P9_RSETATTR(r2, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r6, 0x0, 0x0) 17:18:25 executing program 0: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000001540)="240000006700d17da53a7436fef7001d0a0b49ffed000000800028000800030001000000", 0x24) 17:18:25 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r0) 17:18:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet(r0, 0x0, 0x0, 0x20044881, 0x0, 0x0) 17:18:25 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000001c0)=0x1cb9ecd20d28ed9b) 17:18:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0xc4c85512, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) [ 168.171473][T10608] fuse: Bad value for 'subtype' 17:18:25 executing program 5: mknod(&(0x7f0000000140)='./bus\x00', 0x8000, 0x4503) open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) [ 168.195533][T10596] fuse: Bad value for 'subtype' 17:18:25 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 17:18:25 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0xff93) ftruncate(r0, 0xff0f) 17:18:25 executing program 3: r0 = socket$inet(0x2, 0x6, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0x46f, 0x0, 0x0) [ 168.263860][T10608] fuse: Bad value for 'subtype' 17:18:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x4, &(0x7f0000000000)={&(0x7f00000022c0)={0x14, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x3f00}}, 0x14}}, 0x0) 17:18:25 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0xff93) ftruncate(r0, 0xff0f) [ 168.404309][T10613] fuse: Bad value for 'subtype' 17:18:25 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cdd58e40ca36129a05bc000000"], 0xd}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) getpgid(0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x48000, 0x0) write$FUSE_IOCTL(r3, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000000)='net/ptype\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, 0x0) add_key(&(0x7f0000000340)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) write$P9_RSETATTR(r2, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r6, 0x0, 0x0) 17:18:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) getpgid(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) geteuid() ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) getegid() lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getgroups(0x2, &(0x7f0000000bc0)=[0xee00, 0x0]) getuid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, 0x0, 0x0) pipe(&(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000008580000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000108000000000021854c9d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff"]) 17:18:25 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0xcc3d) 17:18:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x48040) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) ptrace$peek(0x3, 0x0, 0x0) ptrace(0x9, r4) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 17:18:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fffcffffff71a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040040000100006a0af2db00000000850000001a000000b7000000000000009500000000000000aa170cdc99cb36b0ec1d712da825661915f0637eb24af1610d8e84fb27271bdb2835bf82fb9a7ef6a42930f42d30087d02a966d05955462b8a81457a36d8a6cf01de7a1e97d89d254464b84187fa83f36de23b29864ea5d8ea713d3761255306cec9b16ca299b0929a416ee907e1f6e3b97143e19c0d830daf3e9e9985561c83e3fae1b1ab908568df1477eed1ba7d51c4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x4, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) 17:18:25 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0xff93) ftruncate(r0, 0xff0f) 17:18:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) [ 168.667403][T10658] ptrace attach of "/root/syz-executor.1"[10412] was attempted by "/root/syz-executor.1"[10658] 17:18:25 executing program 3: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1}) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) link(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) kexec_load(0x0, 0x0, 0x0, 0x1d0000) sendfile(r0, r0, 0x0, 0x40fdf) ioprio_set$uid(0x3, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x0, 0x0) 17:18:25 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0xff93) ftruncate(r0, 0xff0f) [ 168.817071][T10667] fuse: Bad value for 'subtype' 17:18:25 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) ftruncate(r0, 0xff0f) 17:18:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) getpgid(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) geteuid() ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) getegid() lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getgroups(0x2, &(0x7f0000000bc0)=[0xee00, 0x0]) getuid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, 0x0, 0x0) pipe(&(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000008580000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000108000000000021854c9d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff"]) 17:18:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0xc, 0x0, 0x0, 0x0, 0x47}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 17:18:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 17:18:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) ftruncate(r0, 0xff0f) 17:18:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) 17:18:26 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 17:18:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000007c0)='ip6tnl0\x00', 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() 17:18:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x4b47, 0x0) 17:18:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='&', 0x1}], 0x1) 17:18:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)) ftruncate(r0, 0xff0f) 17:18:26 executing program 2: syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x4000) 17:18:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 17:18:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='&', 0x1}], 0x1) 17:18:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0xff93) ftruncate(r0, 0xff0f) 17:18:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) 17:18:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffcbe}, {0x0}, {0x0, 0xffffffffffffff68}, {&(0x7f0000000100)=ANY=[@ANYBLOB="640000003297e8a84a20d59750000000000361337a6b244bc43aad71be506c3aec260008e2e6ab13c339552715a78305193de38efe5db955b598cfe308d0405750e1344b23d22f08a8fe0136e63b990cbef17b261c9f771817a6c2e2eecda2358db4d84f00000000e2ffffff000000163ed6006377aee093f7f56bd0c7f0292ca759b472b7c74e3644c6563c4dfb1d624a2fb68855c75605fc39bab76e6c67520850f4ad1d"], 0x60}], 0x4}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 17:18:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0xc4c85513, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 17:18:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='&', 0x1}], 0x1) [ 169.844162][T10753] WARNING: CPU: 0 PID: 10753 at fs/block_dev.c:1899 __blkdev_put+0x6ba/0x810 [ 169.852951][T10753] Kernel panic - not syncing: panic_on_warn set ... [ 169.859558][T10753] CPU: 0 PID: 10753 Comm: blkid Not tainted 5.3.0-rc3-next-20190809 #63 [ 169.867882][T10753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.877949][T10753] Call Trace: [ 169.881255][T10753] dump_stack+0x172/0x1f0 [ 169.885600][T10753] ? __blkdev_put+0x5d0/0x810 [ 169.890280][T10753] panic+0x2dc/0x755 [ 169.894177][T10753] ? add_taint.cold+0x16/0x16 [ 169.898865][T10753] ? __kasan_check_write+0x14/0x20 [ 169.903988][T10753] ? __warn.cold+0x5/0x4c [ 169.908327][T10753] ? __warn+0xe7/0x1e0 [ 169.912404][T10753] ? __blkdev_put+0x6ba/0x810 [ 169.917090][T10753] __warn.cold+0x20/0x4c [ 169.921348][T10753] ? __blkdev_put+0x6ba/0x810 [ 169.926305][T10753] report_bug+0x263/0x2b0 [ 169.930648][T10753] do_error_trap+0x11b/0x200 [ 169.944928][T10753] do_invalid_op+0x37/0x50 [ 169.949354][T10753] ? __blkdev_put+0x6ba/0x810 [ 169.954036][T10753] invalid_op+0x23/0x30 [ 169.958210][T10753] RIP: 0010:__blkdev_put+0x6ba/0x810 [ 169.963498][T10753] Code: 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 24 fd ff ff 48 8b bd 50 ff ff ff e8 90 5d e6 ff e9 13 fd ff ff e8 46 6f ab ff <0f> 0b e9 dc fa ff ff 48 89 cf e8 57 5d e6 ff e9 6a fa ff ff 48 8b [ 169.983108][T10753] RSP: 0018:ffff88805ee1fc90 EFLAGS: 00010293 17:18:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0xf0ffff, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xf00, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 17:18:26 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0xff93) ftruncate(r0, 0xff0f) 17:18:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:18:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 17:18:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000001c00)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/192, 0xc0}], 0x1}, 0x0) sendmmsg$inet(r1, &(0x7f0000005440)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000540)="2ec5f773206c989aef56a19dddfb072892159b356a796e0a687fb4137497b53e982c2ed296af7be86c691c2059c3d98bc33062ad8b6e745424ed391d04a9386614662bcf631a2241b73f073ae983b40062e4c6cd958ca4a00b781aa1a758ffc6180e98378728aa554098c368c898ada94f67829791e98825cfb72ca394f85d95a266", 0x82}], 0x1}}], 0x1, 0x0) r2 = gettid() recvmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x1, 0x0, 0x0) tkill(r2, 0x14) [ 169.989186][T10753] RAX: ffff88805ee14480 RBX: ffff88808ac60800 RCX: ffffffff81c6a4c4 [ 169.997159][T10753] RDX: 0000000000000000 RSI: ffffffff81c6a9ea RDI: 0000000000000005 [ 170.005137][T10753] RBP: ffff88805ee1fd88 R08: ffff88805ee14480 R09: ffffed101158c104 [ 170.013165][T10753] R10: ffff88805ee1fc80 R11: ffff88808ac6081f R12: 0000000000000002 [ 170.021151][T10753] R13: dffffc0000000000 R14: ffff88808ac60818 R15: ffff88808ac60818 [ 170.029154][T10753] ? __blkdev_put+0x194/0x810 [ 170.033835][T10753] ? __blkdev_put+0x6ba/0x810 [ 170.038525][T10753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 170.044785][T10753] ? bd_set_size+0xb0/0xb0 [ 170.049201][T10753] ? wait_for_completion+0x440/0x440 [ 170.054488][T10753] blkdev_put+0x98/0x560 [ 170.058738][T10753] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 170.065004][T10753] blkdev_close+0x8b/0xb0 [ 170.069341][T10753] __fput+0x2ff/0x890 [ 170.073350][T10753] ? blkdev_put+0x560/0x560 [ 170.077851][T10753] ____fput+0x16/0x20 [ 170.081835][T10753] task_work_run+0x145/0x1c0 [ 170.086430][T10753] exit_to_usermode_loop+0x316/0x380 [ 170.091735][T10753] do_syscall_64+0x65f/0x760 [ 170.096333][T10753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 170.102219][T10753] RIP: 0033:0x7fb6fa7672b0 [ 170.106631][T10753] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 170.126330][T10753] RSP: 002b:00007ffc4d34f9a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 170.134739][T10753] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb6fa7672b0 [ 170.142701][T10753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 170.150766][T10753] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 170.158738][T10753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000d51030 [ 170.166703][T10753] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 170.175755][T10753] Kernel Offset: disabled [ 170.180081][T10753] Rebooting in 86400 seconds..