[ 45.407621][ T26] audit: type=1800 audit(1554568020.945:25): pid=7668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 45.444035][ T26] audit: type=1800 audit(1554568020.945:26): pid=7668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 45.468536][ T26] audit: type=1800 audit(1554568020.955:27): pid=7668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 45.490656][ T26] audit: type=1800 audit(1554568020.955:28): pid=7668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.255' (ECDSA) to the list of known hosts. 2019/04/06 16:27:09 fuzzer started 2019/04/06 16:27:13 dialing manager at 10.128.0.26:34543 2019/04/06 16:27:18 syscalls: 2408 2019/04/06 16:27:18 code coverage: enabled 2019/04/06 16:27:18 comparison tracing: enabled 2019/04/06 16:27:18 extra coverage: extra coverage is not supported by the kernel 2019/04/06 16:27:18 setuid sandbox: enabled 2019/04/06 16:27:18 namespace sandbox: enabled 2019/04/06 16:27:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/06 16:27:18 fault injection: enabled 2019/04/06 16:27:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/06 16:27:18 net packet injection: enabled 2019/04/06 16:27:18 net device setup: enabled 16:28:58 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x89b0, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) close(r1) close(r0) syzkaller login: [ 162.747232][ T7832] IPVS: ftp: loaded support on port[0] = 21 [ 162.851250][ T7832] chnl_net:caif_netlink_parms(): no params data found 16:28:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = dup3(r1, r0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000005340)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x40a, 0x4) write$UHID_INPUT(r2, &(0x7f0000000f80)={0x8, "fc15c566569acb2e40a580b94a5fb950126d981996fd05cbeb99adecdf6668b453fc0a46592787b5bf7504523bd1c3b9ef6349187ec2ca88a77ecf4f9b8fa690510b730f4a05b6aebb491f9364d7acc436cb14d2e0f46a7dc3f1530caa6fa6e2fb4794fec9a62f87af6df30d810b46ab27f4fbdcf0b376747fb267b78f8d4e41885831fc2cceb868e6d59f1d3000d0c73d54c56ff6889b1279dc59c7d9f84b0b75e457034a1df19653853d25e6726edd8158999efbcae24bff74c5f92ecded22d29332447964ac0f5a870d7c4398b30d68f35cf7cca5c604b53c4e9f0d505fe00dfa433f33aa556f07e89eca4e0c10e558aac1c19484d9d2316e40e7656ef90dee2788dd8f9f3a982db4b239e7cf7c1562e0bc461d2078a19418decc4aecca22630e9f3921bbd1c27caf4eddd872adf419c9bba01621221c71bfc016da7aa0b75a3e635698f289d902429c05fa3647405e09bdf09f64616b0e2f2a9e2b8e53e7b4395eca8454485182aeb32b308c7239f8ade8b49d92ffdbdfe2b64f765d16fd463b9b426d1cd06a7ecadded69f0e0c8393529e2f0e07a255a69bdd76f72c754145e98658a6f9d1ab89154dd2bf9ef51d2d2303a69eed7eec50f90c7a8db44a68fe98c3e2550e6b10bff554cf79dddc62a826e3d4c139850976bf9a3d8fe4f4a178b2753a98cd6df2e3af41fb5cc6228ed192734bb5ec74d0e4280a0d34293adefb3f8580b6caae5e84f26fa4a032fdaa3e6d193d8f3c10ed481ebc3ff180f20febb1993f9c2d24d9c537dabd541e6b2dfe267e0fc6b72bc1c371c8be6e1ab3e352a5c6521e26a8ebcf4b285051ffa56a9b182fa1059b5ce21eba43ff69c534455236f148a6a92a2108ee874fee5de66544d53f5c7891f34ea309b93929840c53602f342db2448bf51e434f1213a1705608f531a0537a578e84d1a787c108031d3ad4573e8a68f356f79fd22ae1c36fe1f28317859f4ed600b0c9dfe4dd2dbeb9966d0f9e09976865bb91c11d2ef876b9b8ac57cf29cc4666372b6e4da45df661e5c7e9b0c057c7f2637892aa3a9c58c9edcfb1ddb449f4fbb8701ce1701d7d70d441c7252acf41bd24c676713411f15068852f322edb7a959ad4955c83825026ed52a4af884021b96e1fd2f5cb32677145ab3e538c0c7888aebf28afc3422f4ac23229b8b52da79a5ba026a98f7c703e9f7ecf1eafbb49bfdfcdb18f4fe2ce97e318e129a4af2e283d3258b0e73b1b525116a8c35020c27baee5b3260c8074175f48775b0984c9be3390e73053f8d598ef2a30964fd40ba7f11fa0f6bc1f17144c4e5ec0d8f11a7bb855315afc450df3a919de4d74a119d649a1829b00203eb377ef2b5cca2466f0fbf37ce8bbf0bd498811b6e8be07456691109936fe9edcda737cd3399c3064331405f1fd5ba0e189b473f6f7b862bd6e9e30ef89c6bfed9eb3641858d785f57e110652dc80752aaaa3d7f86602a9bba2a6213104257e8affe93c77744099ec3a9affa40f2a5fe5084dd12775e91d59a868f85d52dabfd3d033cad5c720f9ff6c27f0aa7575e5d0f0dd458ddf953a0e8bc265bd5ad2ba5b6b7e14ff75d94e09deb23f7261b24d9cfcf4fc566055b59c6636e9724a31d93b0713ea4644f0850a97a389a3074477be724dcd584e0225568d3ffc5f455b17ec384ea57c4ecce8cfdae3297002e66189b22c7bef646c25d32935fc449b10209a503a9a5284f6aec222b4c0e170e8f6858388b73ba3fecd631a0aa53ca66cb8541d68cc4f692d39fc53a9d032acd87ee4d5cfa52d36a3e3bee904bb9dc3056ece1c5e0bb27150abc9a50e606bd14d3691d021caf9a7a7ad96b637e0fb2ffa3f2eb107b37601fd6b1f6734774e500cac3833ac410b913086f02355f93d486d20b1dac03781e7cda10fbd10fba297ff3389b1aff5a89a1115f5a7ec44e22a82f366a532a47aa8aee6e7235248d6e17cc40ab3e09d571e5153e3a4b3479bf5e402647a5fa9abdeb0777efa8609df3d7ca95a80a2424dd241690db946cc29665963b280b467860d6bb9cfb22d66a5deb1cb567ba70dc42bfa16a89fa8a4a8bff5b4f97cdb1d9584039a4e006b8ebd2bc63b82eb76e36db2b5b91a711877f6fdf16d0dd4cc00023528b88ba6bae1d5909f4251333799629f4d38d1ed735ac6fecbff8331242e65f627ce6f773e36168a18036267263c5927127a82034690fb7bf17bea19cf5d27c3dc0eae92a9b4c9a720b778b6d2ce9c240932c1a087cdae4cfed986abb08f7a97d194ca043957f698f94eaa664eb72f4a5a7b1f9dfdf0856957dcd23d25b84e7020169406ae3f21729fbd9e0a8d2b0a7d425a899d54835d0c6ff7c3f3f0680197a84d8e8e945756c645d90ab24b872f84ec1a1fe7f2e36ca9fd50799e4b88097edc40d535b9e1419f4c2a648fc632471b476a359217eac178990d26c490a6839d69f3e56adf1b166b0d82b1fe69218deb49900084f9edd8ef05013296d5cd285e37b040cdfabb8f3b65bfdf5ba2144e146a8f35cb930a3720a88b7a9fe8b3d82f781d03c506e35dbd5055a1bfad0382c22c0af7956382c136baa2639d0188b14fd5e4ad36d43801d46286ff72c0faf116813f18a937d65b365f74d4e1732237c96df5967b70ca7a76bbd3bf4650ddb62e8b908dcecfc72afc07b75b0871f1388ff614202e0e69d1c29ff9bcf3f81f6ff61dc6ccdbf7996f1ba1ce7ea5cdf32cf7e851c1be04a2e359a8a83b6034fbf9422e9860e487d1afb3e707a3daf9dd6efd35fbd720e3957b5bed77021983e4122a94d1f8b18a9c0bd482b2dfa73430eae5f22e9d87eafedc3e4c93c11761e7b4e4e15d9898b26b110a7d620d01a804f04e62b89a868ed91b55985f81e4d923af79c74579878a2421d8af283093c32821b9ce3a41632248e8e8fbfef711adbcdfd23620acac79bfa3536259c27ccd3297965c6a1b532410ae97623d9dda706f4b66f8e055c5becb260341706bcb72d32029cf0cd5c39b1d66fa78b0b81c8ad5b184f24fe309d647b936664f14d374b6d3ddecfb07bbf4d641330f6a2e8144cb284b0a782776cef9d5c34e8a037c512fd33bf4cc597690b1409fd32a7541645a27363aba02598ba2efd2233f53fbefbf93cad6e8ac9a3c7e7a98f2916df2921927c9785599d521690ed328bfa427d1d254423138e8a6f0ac0eab8220bd5cd23ebe3d408bbbe21b37fb3c360087b17f738f6d226fdc3cf0092166d388245888c799ec5872908d79fb8318a601fddd6ce2a27bca9c7b2378dbb37e0313b7f6c60a436913f3dc594de3b171f612c387c8314a49d62b9b7bc7801aa0d614583b9e5b2dd1365cff0540fd0fa3a8a4c473a7a8cd732749be50713e069bc320cc0defc0e79ab904c878ddc24e1f75e340a0d0630539920614e9fd33f5199c180eb1e70788ffe8e4907b3ec60d0bd563072019f60afe2fb7befbaed0de385a4dfcd4674236547b1d65915cfbf79004a81bf8739c23852bd1357313f629abb5d275a4c995de2f6b64a76c51677a72405d99dff3caa91ddda883983f033b9eccd5a3ac3741c872090e04d0406fc7b079f0c68b500f26a69f0249c094fe91a3d47160ccbd68b5ae058344540e9fcd086e87531e35f7c4cfe83fa37422f557608fa82b71b17f1d375db35e05cf84a04620e2baec37b0f04597b18bb7581a21fe15b72a257f7d162ba77ec45dd6d88a8812e325f0309e998099c0e38dee5c5298032a899d97472284c8a0d13874a316b5c3f3b48f36117aa5d4fa77eab1b6bb3a1e7d04fe5da0354b6a3eb28e99908757635e84cbf47e9dd559f447b49bed6d6f39734d879f556d03ee857d6dc6d4e41fb8b6197fb7977c056150e100aec3e66040ccc496de251115d50eeb0bcacd3c9feacab5fa5b9d73cb1a6310ac32a29a89dc7ededeab2c05b395f51f429214c67a28c04204cc1a8dbd3e6274a59180ff9aeaef423ad577356150915bc57384d0b4d3386d507c41339c96a22d80d27938bf99cc89e5375db13d257214d4dd21c8701033d00d4415c14e60365a5ea1de202266ee4f8d2af5ee30c153a3a6ff435657fe9d789998feea489b83abb467083f6e00373baec7da8af2032a5e5d796164f8a9f107e68049c2ed2143c44a14381119c98bfa8a99798a9ea9a153c5de7338a14cd204cd2f97fa0b66f5ba7a1eb4315d7bbb8a2327125fd432490988b19b810613fde6f5205cc8945d9ce5feabdd70a74074c3f9309f22251a29d9bec2ecd36c53916d94f9d35eb32be9f8d83fbfe6d8b7e98c9d01d48d6cafaade5f723fae7fece3aee8d4b62a356b54f0ce23605d20c815a4b947027ef8daa3f3c1918911044306e7b5c6f90c613286147fcbad20869758dd26f64a609ef14e1e8ee85cfb890d33ac7dbfe07b9ed5a91a53d818c08555c3e0174f0c97ca5c75069abe799eaa233d699f8c419c8d330b24389580f73ac96f5a26025eacffcbefe7ba5424009df5635561a68c9a6331a6ae7142c0c1f4a0d562c9659d7120908f4993ceb47e420c8468323b89cf12403568abeff0614e6876f7744a45c3a18a2b439142993c444091bbcac1b0a2f99525d6e7d504339430ad9b8e3c42e191352ed55a91b283449af5040a0abb45071f82149b757e26e1d9588fcb353f2eb8e1de789268b7174a273cb5711b9fb9e750e76f6a4cdfaee7e33a6b3e3e41ba08cad8c2c7a3078005e6d1955c40b307d059bba4928577e961c1079db5dae81ed1701d91df3d083d1b415d5328c46a058b0211ea412182d6d7f7dc125799b5940193f4ebac68ae92e955a7c8bc21ccc9c63cc11a981bbe04898965684f06c1a2fd1e9ed097bd7645da6326cfc67745eb33a1f970ca338cd3aa6a7f588cbf67b9bfe5468b8ba31b40d22870d2b6df36dbe156eaddfb71fee6e5204c01932829ca8075e3dc57ff46586febe1009073348e6f2525efaa9982074c8b7c4073955cb2a613f38340494a0ced8538941bc80f2002d50968f992b2cc5cc0957fad839549eeb87357f30ebe2f63b3ee25bf633f4a95beac488746aa148305b16fec837b73fc306a601105ddd5b2d5da2f9b9b06d607a5a0c76e9523bec08aaadad5fb72e8120a237a678f68e43d033e9c9799399b4acb68e5c19f23d0e504cdea550d41d6a525d0715c80dff2c3bb96c4f70dc3fb0f5684b30f1cb5df5b0efa510fbea0c5a47a2092ac113cc25780711b3f480322d583330eac34edfcdd23305db610e7e4ec71b07859172f05d0de16fd087d2af69f68ff9a53946390a696188821c3670138666d859c6500990a1299db9dd4c4a6fd9b9a1c71d8f67121df360712ff10245a4f0ce033ce9a2ffcbfd0ede6f03fcfe44cc264d6111b4eadb2f7f1f9a9492fc0821e9d27ae00f4d8d138c7bb3742a78a24112f37f37ffc87dabb62700526d0c4b1023d9b2082ee5524b18c319d36650912075245254962065061586bde8c980b368b0b6911286849c59eb4e581307a07a42eceffe5a64acd9592f9d1c6b7f28d19340b5e88a67e0821ca4ef5f4c739378c854abe3c2fb7e5fe16d50338b7ccc5e8295c5616accbb63c9456a1c2c6811f501eb328240aae935f2e26f61766e492f315024ba472094e2a866912202662e6fe5c01a9ebfe070dbcf06e96ce013c8a8444ac0302274ce65e5ec4b9ee8d3d3df97105915a698a226f7ad8e26f87c1c59c6c21d9e81ec0e4589f0c7e58da43c643bfc713c0a2449a7c086dad4eb9ffa52ad84e17e161ed772e95aed120853a76bb600a0f2684f61514e2cbefd4f1c32d7df0791e7e4bdfd868eb5bd", 0x1000}, 0x1006) [ 162.900243][ T7832] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.909857][ T7832] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.920536][ T7832] device bridge_slave_0 entered promiscuous mode [ 162.947964][ T7832] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.965030][ T7832] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.984393][ T7832] device bridge_slave_1 entered promiscuous mode [ 163.022113][ T7832] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.035249][ T7832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.060143][ T7832] team0: Port device team_slave_0 added [ 163.074638][ T7832] team0: Port device team_slave_1 added [ 163.091193][ T7835] IPVS: ftp: loaded support on port[0] = 21 16:28:58 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000000)={@empty=[0x0, 0x0, 0x500, 0x0, 0x88caffff], @local, [], {@generic={0x8864, "42a703000000"}}}, 0x0) [ 163.172480][ T7832] device hsr_slave_0 entered promiscuous mode [ 163.233258][ T7832] device hsr_slave_1 entered promiscuous mode 16:28:58 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 163.423877][ T7832] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.431178][ T7832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.439248][ T7832] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.446393][ T7832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.506012][ T7837] IPVS: ftp: loaded support on port[0] = 21 [ 163.530872][ T7839] IPVS: ftp: loaded support on port[0] = 21 16:28:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) [ 163.624790][ T7832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.669292][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.687632][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.713311][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.734106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 163.771108][ T7832] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.799014][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.801565][ T7843] IPVS: ftp: loaded support on port[0] = 21 [ 163.818432][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.825564][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.871344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.885498][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.892605][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 16:28:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x7b, &(0x7f00000000c0)=[@in], 0x10) [ 164.031963][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.041367][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.051329][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.060235][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.070235][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.079574][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.089346][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.098129][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.108570][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.132500][ T7832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.177590][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.189903][ T7837] chnl_net:caif_netlink_parms(): no params data found [ 164.223157][ T7839] chnl_net:caif_netlink_parms(): no params data found [ 164.235489][ T7835] chnl_net:caif_netlink_parms(): no params data found [ 164.239082][ T7848] IPVS: ftp: loaded support on port[0] = 21 [ 164.364478][ T7832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.389328][ T7837] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.396661][ T7837] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.405030][ T7837] device bridge_slave_0 entered promiscuous mode [ 164.413457][ T7843] chnl_net:caif_netlink_parms(): no params data found [ 164.479665][ T7837] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.489831][ T7837] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.500591][ T7837] device bridge_slave_1 entered promiscuous mode [ 164.703050][ T7835] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.710315][ T7835] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.721747][ T7835] device bridge_slave_0 entered promiscuous mode [ 164.742752][ T7837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.751833][ T7839] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.761439][ T7839] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.772465][ T7839] device bridge_slave_0 entered promiscuous mode [ 164.818319][ T7835] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.841412][ T7835] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.858513][ T7835] device bridge_slave_1 entered promiscuous mode [ 164.870012][ T7837] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.878502][ T7839] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.886114][ T7839] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.894450][ T7839] device bridge_slave_1 entered promiscuous mode [ 164.901941][ T7843] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.910212][ T7843] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.918785][ T7843] device bridge_slave_0 entered promiscuous mode [ 164.949269][ T7843] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.956676][ T7843] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.964703][ T7843] device bridge_slave_1 entered promiscuous mode [ 164.986160][ T7835] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.004278][ T7839] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.015885][ T7837] team0: Port device team_slave_0 added [ 165.038475][ T7843] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.049180][ T7835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.059832][ T7839] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.074652][ T7837] team0: Port device team_slave_1 added [ 165.081885][ T7843] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:29:00 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x89b0, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) close(r1) close(r0) [ 165.137207][ T7843] team0: Port device team_slave_0 added [ 165.152915][ T7835] team0: Port device team_slave_0 added [ 165.187035][ T7843] team0: Port device team_slave_1 added [ 165.195337][ T7835] team0: Port device team_slave_1 added [ 165.202367][ T7839] team0: Port device team_slave_0 added [ 165.275952][ T7837] device hsr_slave_0 entered promiscuous mode [ 165.313570][ T7837] device hsr_slave_1 entered promiscuous mode 16:29:00 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x89b0, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) close(r1) close(r0) [ 165.377069][ T7839] team0: Port device team_slave_1 added [ 165.395759][ T7848] chnl_net:caif_netlink_parms(): no params data found [ 165.516403][ T7839] device hsr_slave_0 entered promiscuous mode [ 165.563562][ T7839] device hsr_slave_1 entered promiscuous mode [ 165.654831][ T7843] device hsr_slave_0 entered promiscuous mode [ 165.714289][ T7843] device hsr_slave_1 entered promiscuous mode [ 165.794761][ T7835] device hsr_slave_0 entered promiscuous mode [ 165.853162][ T7835] device hsr_slave_1 entered promiscuous mode 16:29:01 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x89b0, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) close(r1) close(r0) [ 165.999641][ T7848] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.008401][ T7848] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.017142][ T7848] device bridge_slave_0 entered promiscuous mode [ 166.028561][ T7848] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.035774][ T7848] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.043864][ T7848] device bridge_slave_1 entered promiscuous mode [ 166.108193][ T7848] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.120642][ T7848] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.161639][ T7839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.205349][ T7848] team0: Port device team_slave_0 added [ 166.215034][ T7848] team0: Port device team_slave_1 added [ 166.223984][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.231764][ T2960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 16:29:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) [ 166.261853][ T7839] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.296114][ T7843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.309088][ T7837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.325186][ T7876] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 166.392104][ T7848] device hsr_slave_0 entered promiscuous mode [ 166.443675][ T7848] device hsr_slave_1 entered promiscuous mode [ 166.485593][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 166.485609][ T26] audit: type=1800 audit(1554568142.025:31): pid=7880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=3 res=0 [ 166.499251][ T7848] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.519379][ T7848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.529358][ C0] hrtimer: interrupt took 26234 ns [ 166.549982][ T26] audit: type=1804 audit(1554568142.075:32): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676968573/syzkaller.mj90Wb/4/file0/file0" dev="loop0" ino=3 res=1 [ 166.577729][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.594218][ T26] audit: type=1800 audit(1554568142.085:33): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=3 res=0 [ 166.616304][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.625728][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.643490][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.650594][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.659265][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.668644][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.677721][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.684860][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.693532][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.702741][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.712494][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.720640][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.742577][ T7837] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.781043][ T7843] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.809588][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.818990][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.834116][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.849800][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.862410][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.877012][ T26] audit: type=1804 audit(1554568142.415:34): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676968573/syzkaller.mj90Wb/4/file0/file0" dev="loop0" ino=3 res=1 [ 166.905264][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.914699][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.923044][ T26] audit: type=1804 audit(1554568142.445:35): pid=7877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676968573/syzkaller.mj90Wb/4/file0/file0" dev="loop0" ino=3 res=1 [ 166.949250][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.958012][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.004192][ T7835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.019755][ T7877] syz-executor.0 (7877) used greatest stack depth: 22088 bytes left 16:29:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) [ 167.061361][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.077851][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.086939][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.098947][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.106256][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.114521][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.123598][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.132052][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.139279][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.147910][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.156844][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.165898][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.175056][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.183682][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.190748][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.198669][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.207337][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.216112][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.223318][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.231044][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.240079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.249102][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.275580][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.302409][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.311859][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.320488][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.329477][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.338980][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.348335][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.357159][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.365803][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.374627][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.384670][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.392535][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.418042][ T26] audit: type=1800 audit(1554568142.945:36): pid=7889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16523 res=0 [ 167.434454][ T7839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.452502][ T26] audit: type=1804 audit(1554568142.985:37): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676968573/syzkaller.mj90Wb/5/file0/file0" dev="sda1" ino=16523 res=1 [ 167.458947][ T7837] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.484839][ T26] audit: type=1800 audit(1554568142.985:38): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16523 res=0 [ 167.490910][ T7837] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.535291][ T7835] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.546708][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.555756][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.565043][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.576478][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.586269][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.596010][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.605703][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.614875][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.624084][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.632721][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.655014][ T7837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.685442][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.700832][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.715150][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.724723][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.734833][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.744153][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.751266][ T7842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.759514][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.769022][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.778191][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.785428][ T7842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.795717][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.805263][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.814652][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.823785][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.835623][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.851876][ T7848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.870012][ T7840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.885154][ T7840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.930905][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.951055][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.967166][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.985878][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.000219][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.015375][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 16:29:03 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000000)={@empty=[0x0, 0x0, 0x500, 0x0, 0x88caffff], @local, [], {@generic={0x8864, "42a703000000"}}}, 0x0) [ 168.028379][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.044293][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.085509][ T7848] 8021q: adding VLAN 0 to HW filter on device team0 16:29:03 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000000)={@empty=[0x0, 0x0, 0x500, 0x0, 0x88caffff], @local, [], {@generic={0x8864, "42a703000000"}}}, 0x0) [ 168.134423][ T7843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.202402][ T7835] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.216177][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.243801][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.252485][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.259714][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.267590][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.283435][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.291874][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.299033][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.307965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.317220][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.328965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.339125][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.403460][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.411578][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.435007][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.453516][ T7909] ptrace attach of "/root/syz-executor.4"[7843] was attempted by "/root/syz-executor.4"[7909] [ 168.470147][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.478843][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.490037][ T7910] ptrace attach of "/root/syz-executor.4"[7843] was attempted by "/root/syz-executor.4"[7910] [ 168.492539][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.516918][ T7842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.531199][ T7848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 16:29:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = dup3(r1, r0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000005340)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x40a, 0x4) write$UHID_INPUT(r2, &(0x7f0000000f80)={0x8, "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", 0x1000}, 0x1006) 16:29:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:04 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:04 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) syz_emit_ethernet(0x14, &(0x7f0000000000)={@empty=[0x0, 0x0, 0x500, 0x0, 0x88caffff], @local, [], {@generic={0x8864, "42a703000000"}}}, 0x0) [ 168.638576][ T7848] 8021q: adding VLAN 0 to HW filter on device batadv0 16:29:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x7b, &(0x7f00000000c0)=[@in], 0x10) 16:29:04 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:29:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = dup3(r1, r0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000005340)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x40a, 0x4) write$UHID_INPUT(r2, &(0x7f0000000f80)={0x8, "fc15c566569acb2e40a580b94a5fb950126d981996fd05cbeb99adecdf6668b453fc0a46592787b5bf7504523bd1c3b9ef6349187ec2ca88a77ecf4f9b8fa690510b730f4a05b6aebb491f9364d7acc436cb14d2e0f46a7dc3f1530caa6fa6e2fb4794fec9a62f87af6df30d810b46ab27f4fbdcf0b376747fb267b78f8d4e41885831fc2cceb868e6d59f1d3000d0c73d54c56ff6889b1279dc59c7d9f84b0b75e457034a1df19653853d25e6726edd8158999efbcae24bff74c5f92ecded22d29332447964ac0f5a870d7c4398b30d68f35cf7cca5c604b53c4e9f0d505fe00dfa433f33aa556f07e89eca4e0c10e558aac1c19484d9d2316e40e7656ef90dee2788dd8f9f3a982db4b239e7cf7c1562e0bc461d2078a19418decc4aecca22630e9f3921bbd1c27caf4eddd872adf419c9bba01621221c71bfc016da7aa0b75a3e635698f289d902429c05fa3647405e09bdf09f64616b0e2f2a9e2b8e53e7b4395eca8454485182aeb32b308c7239f8ade8b49d92ffdbdfe2b64f765d16fd463b9b426d1cd06a7ecadded69f0e0c8393529e2f0e07a255a69bdd76f72c754145e98658a6f9d1ab89154dd2bf9ef51d2d2303a69eed7eec50f90c7a8db44a68fe98c3e2550e6b10bff554cf79dddc62a826e3d4c139850976bf9a3d8fe4f4a178b2753a98cd6df2e3af41fb5cc6228ed192734bb5ec74d0e4280a0d34293adefb3f8580b6caae5e84f26fa4a032fdaa3e6d193d8f3c10ed481ebc3ff180f20febb1993f9c2d24d9c537dabd541e6b2dfe267e0fc6b72bc1c371c8be6e1ab3e352a5c6521e26a8ebcf4b285051ffa56a9b182fa1059b5ce21eba43ff69c534455236f148a6a92a2108ee874fee5de66544d53f5c7891f34ea309b93929840c53602f342db2448bf51e434f1213a1705608f531a0537a578e84d1a787c108031d3ad4573e8a68f356f79fd22ae1c36fe1f28317859f4ed600b0c9dfe4dd2dbeb9966d0f9e09976865bb91c11d2ef876b9b8ac57cf29cc4666372b6e4da45df661e5c7e9b0c057c7f2637892aa3a9c58c9edcfb1ddb449f4fbb8701ce1701d7d70d441c7252acf41bd24c676713411f15068852f322edb7a959ad4955c83825026ed52a4af884021b96e1fd2f5cb32677145ab3e538c0c7888aebf28afc3422f4ac23229b8b52da79a5ba026a98f7c703e9f7ecf1eafbb49bfdfcdb18f4fe2ce97e318e129a4af2e283d3258b0e73b1b525116a8c35020c27baee5b3260c8074175f48775b0984c9be3390e73053f8d598ef2a30964fd40ba7f11fa0f6bc1f17144c4e5ec0d8f11a7bb855315afc450df3a919de4d74a119d649a1829b00203eb377ef2b5cca2466f0fbf37ce8bbf0bd498811b6e8be07456691109936fe9edcda737cd3399c3064331405f1fd5ba0e189b473f6f7b862bd6e9e30ef89c6bfed9eb3641858d785f57e110652dc80752aaaa3d7f86602a9bba2a6213104257e8affe93c77744099ec3a9affa40f2a5fe5084dd12775e91d59a868f85d52dabfd3d033cad5c720f9ff6c27f0aa7575e5d0f0dd458ddf953a0e8bc265bd5ad2ba5b6b7e14ff75d94e09deb23f7261b24d9cfcf4fc566055b59c6636e9724a31d93b0713ea4644f0850a97a389a3074477be724dcd584e0225568d3ffc5f455b17ec384ea57c4ecce8cfdae3297002e66189b22c7bef646c25d32935fc449b10209a503a9a5284f6aec222b4c0e170e8f6858388b73ba3fecd631a0aa53ca66cb8541d68cc4f692d39fc53a9d032acd87ee4d5cfa52d36a3e3bee904bb9dc3056ece1c5e0bb27150abc9a50e606bd14d3691d021caf9a7a7ad96b637e0fb2ffa3f2eb107b37601fd6b1f6734774e500cac3833ac410b913086f02355f93d486d20b1dac03781e7cda10fbd10fba297ff3389b1aff5a89a1115f5a7ec44e22a82f366a532a47aa8aee6e7235248d6e17cc40ab3e09d571e5153e3a4b3479bf5e402647a5fa9abdeb0777efa8609df3d7ca95a80a2424dd241690db946cc29665963b280b467860d6bb9cfb22d66a5deb1cb567ba70dc42bfa16a89fa8a4a8bff5b4f97cdb1d9584039a4e006b8ebd2bc63b82eb76e36db2b5b91a711877f6fdf16d0dd4cc00023528b88ba6bae1d5909f4251333799629f4d38d1ed735ac6fecbff8331242e65f627ce6f773e36168a18036267263c5927127a82034690fb7bf17bea19cf5d27c3dc0eae92a9b4c9a720b778b6d2ce9c240932c1a087cdae4cfed986abb08f7a97d194ca043957f698f94eaa664eb72f4a5a7b1f9dfdf0856957dcd23d25b84e7020169406ae3f21729fbd9e0a8d2b0a7d425a899d54835d0c6ff7c3f3f0680197a84d8e8e945756c645d90ab24b872f84ec1a1fe7f2e36ca9fd50799e4b88097edc40d535b9e1419f4c2a648fc632471b476a359217eac178990d26c490a6839d69f3e56adf1b166b0d82b1fe69218deb49900084f9edd8ef05013296d5cd285e37b040cdfabb8f3b65bfdf5ba2144e146a8f35cb930a3720a88b7a9fe8b3d82f781d03c506e35dbd5055a1bfad0382c22c0af7956382c136baa2639d0188b14fd5e4ad36d43801d46286ff72c0faf116813f18a937d65b365f74d4e1732237c96df5967b70ca7a76bbd3bf4650ddb62e8b908dcecfc72afc07b75b0871f1388ff614202e0e69d1c29ff9bcf3f81f6ff61dc6ccdbf7996f1ba1ce7ea5cdf32cf7e851c1be04a2e359a8a83b6034fbf9422e9860e487d1afb3e707a3daf9dd6efd35fbd720e3957b5bed77021983e4122a94d1f8b18a9c0bd482b2dfa73430eae5f22e9d87eafedc3e4c93c11761e7b4e4e15d9898b26b110a7d620d01a804f04e62b89a868ed91b55985f81e4d923af79c74579878a2421d8af283093c32821b9ce3a41632248e8e8fbfef711adbcdfd23620acac79bfa3536259c27ccd3297965c6a1b532410ae97623d9dda706f4b66f8e055c5becb260341706bcb72d32029cf0cd5c39b1d66fa78b0b81c8ad5b184f24fe309d647b936664f14d374b6d3ddecfb07bbf4d641330f6a2e8144cb284b0a782776cef9d5c34e8a037c512fd33bf4cc597690b1409fd32a7541645a27363aba02598ba2efd2233f53fbefbf93cad6e8ac9a3c7e7a98f2916df2921927c9785599d521690ed328bfa427d1d254423138e8a6f0ac0eab8220bd5cd23ebe3d408bbbe21b37fb3c360087b17f738f6d226fdc3cf0092166d388245888c799ec5872908d79fb8318a601fddd6ce2a27bca9c7b2378dbb37e0313b7f6c60a436913f3dc594de3b171f612c387c8314a49d62b9b7bc7801aa0d614583b9e5b2dd1365cff0540fd0fa3a8a4c473a7a8cd732749be50713e069bc320cc0defc0e79ab904c878ddc24e1f75e340a0d0630539920614e9fd33f5199c180eb1e70788ffe8e4907b3ec60d0bd563072019f60afe2fb7befbaed0de385a4dfcd4674236547b1d65915cfbf79004a81bf8739c23852bd1357313f629abb5d275a4c995de2f6b64a76c51677a72405d99dff3caa91ddda883983f033b9eccd5a3ac3741c872090e04d0406fc7b079f0c68b500f26a69f0249c094fe91a3d47160ccbd68b5ae058344540e9fcd086e87531e35f7c4cfe83fa37422f557608fa82b71b17f1d375db35e05cf84a04620e2baec37b0f04597b18bb7581a21fe15b72a257f7d162ba77ec45dd6d88a8812e325f0309e998099c0e38dee5c5298032a899d97472284c8a0d13874a316b5c3f3b48f36117aa5d4fa77eab1b6bb3a1e7d04fe5da0354b6a3eb28e99908757635e84cbf47e9dd559f447b49bed6d6f39734d879f556d03ee857d6dc6d4e41fb8b6197fb7977c056150e100aec3e66040ccc496de251115d50eeb0bcacd3c9feacab5fa5b9d73cb1a6310ac32a29a89dc7ededeab2c05b395f51f429214c67a28c04204cc1a8dbd3e6274a59180ff9aeaef423ad577356150915bc57384d0b4d3386d507c41339c96a22d80d27938bf99cc89e5375db13d257214d4dd21c8701033d00d4415c14e60365a5ea1de202266ee4f8d2af5ee30c153a3a6ff435657fe9d789998feea489b83abb467083f6e00373baec7da8af2032a5e5d796164f8a9f107e68049c2ed2143c44a14381119c98bfa8a99798a9ea9a153c5de7338a14cd204cd2f97fa0b66f5ba7a1eb4315d7bbb8a2327125fd432490988b19b810613fde6f5205cc8945d9ce5feabdd70a74074c3f9309f22251a29d9bec2ecd36c53916d94f9d35eb32be9f8d83fbfe6d8b7e98c9d01d48d6cafaade5f723fae7fece3aee8d4b62a356b54f0ce23605d20c815a4b947027ef8daa3f3c1918911044306e7b5c6f90c613286147fcbad20869758dd26f64a609ef14e1e8ee85cfb890d33ac7dbfe07b9ed5a91a53d818c08555c3e0174f0c97ca5c75069abe799eaa233d699f8c419c8d330b24389580f73ac96f5a26025eacffcbefe7ba5424009df5635561a68c9a6331a6ae7142c0c1f4a0d562c9659d7120908f4993ceb47e420c8468323b89cf12403568abeff0614e6876f7744a45c3a18a2b439142993c444091bbcac1b0a2f99525d6e7d504339430ad9b8e3c42e191352ed55a91b283449af5040a0abb45071f82149b757e26e1d9588fcb353f2eb8e1de789268b7174a273cb5711b9fb9e750e76f6a4cdfaee7e33a6b3e3e41ba08cad8c2c7a3078005e6d1955c40b307d059bba4928577e961c1079db5dae81ed1701d91df3d083d1b415d5328c46a058b0211ea412182d6d7f7dc125799b5940193f4ebac68ae92e955a7c8bc21ccc9c63cc11a981bbe04898965684f06c1a2fd1e9ed097bd7645da6326cfc67745eb33a1f970ca338cd3aa6a7f588cbf67b9bfe5468b8ba31b40d22870d2b6df36dbe156eaddfb71fee6e5204c01932829ca8075e3dc57ff46586febe1009073348e6f2525efaa9982074c8b7c4073955cb2a613f38340494a0ced8538941bc80f2002d50968f992b2cc5cc0957fad839549eeb87357f30ebe2f63b3ee25bf633f4a95beac488746aa148305b16fec837b73fc306a601105ddd5b2d5da2f9b9b06d607a5a0c76e9523bec08aaadad5fb72e8120a237a678f68e43d033e9c9799399b4acb68e5c19f23d0e504cdea550d41d6a525d0715c80dff2c3bb96c4f70dc3fb0f5684b30f1cb5df5b0efa510fbea0c5a47a2092ac113cc25780711b3f480322d583330eac34edfcdd23305db610e7e4ec71b07859172f05d0de16fd087d2af69f68ff9a53946390a696188821c3670138666d859c6500990a1299db9dd4c4a6fd9b9a1c71d8f67121df360712ff10245a4f0ce033ce9a2ffcbfd0ede6f03fcfe44cc264d6111b4eadb2f7f1f9a9492fc0821e9d27ae00f4d8d138c7bb3742a78a24112f37f37ffc87dabb62700526d0c4b1023d9b2082ee5524b18c319d36650912075245254962065061586bde8c980b368b0b6911286849c59eb4e581307a07a42eceffe5a64acd9592f9d1c6b7f28d19340b5e88a67e0821ca4ef5f4c739378c854abe3c2fb7e5fe16d50338b7ccc5e8295c5616accbb63c9456a1c2c6811f501eb328240aae935f2e26f61766e492f315024ba472094e2a866912202662e6fe5c01a9ebfe070dbcf06e96ce013c8a8444ac0302274ce65e5ec4b9ee8d3d3df97105915a698a226f7ad8e26f87c1c59c6c21d9e81ec0e4589f0c7e58da43c643bfc713c0a2449a7c086dad4eb9ffa52ad84e17e161ed772e95aed120853a76bb600a0f2684f61514e2cbefd4f1c32d7df0791e7e4bdfd868eb5bd", 0x1000}, 0x1006) [ 168.858289][ T26] audit: type=1800 audit(1554568144.395:39): pid=7934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16545 res=0 [ 169.061094][ T26] audit: type=1800 audit(1554568144.395:40): pid=7922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=4 res=0 16:29:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x7b, &(0x7f00000000c0)=[@in], 0x10) 16:29:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = dup3(r1, r0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000005340)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x40a, 0x4) write$UHID_INPUT(r2, &(0x7f0000000f80)={0x8, "fc15c566569acb2e40a580b94a5fb950126d981996fd05cbeb99adecdf6668b453fc0a46592787b5bf7504523bd1c3b9ef6349187ec2ca88a77ecf4f9b8fa690510b730f4a05b6aebb491f9364d7acc436cb14d2e0f46a7dc3f1530caa6fa6e2fb4794fec9a62f87af6df30d810b46ab27f4fbdcf0b376747fb267b78f8d4e41885831fc2cceb868e6d59f1d3000d0c73d54c56ff6889b1279dc59c7d9f84b0b75e457034a1df19653853d25e6726edd8158999efbcae24bff74c5f92ecded22d29332447964ac0f5a870d7c4398b30d68f35cf7cca5c604b53c4e9f0d505fe00dfa433f33aa556f07e89eca4e0c10e558aac1c19484d9d2316e40e7656ef90dee2788dd8f9f3a982db4b239e7cf7c1562e0bc461d2078a19418decc4aecca22630e9f3921bbd1c27caf4eddd872adf419c9bba01621221c71bfc016da7aa0b75a3e635698f289d902429c05fa3647405e09bdf09f64616b0e2f2a9e2b8e53e7b4395eca8454485182aeb32b308c7239f8ade8b49d92ffdbdfe2b64f765d16fd463b9b426d1cd06a7ecadded69f0e0c8393529e2f0e07a255a69bdd76f72c754145e98658a6f9d1ab89154dd2bf9ef51d2d2303a69eed7eec50f90c7a8db44a68fe98c3e2550e6b10bff554cf79dddc62a826e3d4c139850976bf9a3d8fe4f4a178b2753a98cd6df2e3af41fb5cc6228ed192734bb5ec74d0e4280a0d34293adefb3f8580b6caae5e84f26fa4a032fdaa3e6d193d8f3c10ed481ebc3ff180f20febb1993f9c2d24d9c537dabd541e6b2dfe267e0fc6b72bc1c371c8be6e1ab3e352a5c6521e26a8ebcf4b285051ffa56a9b182fa1059b5ce21eba43ff69c534455236f148a6a92a2108ee874fee5de66544d53f5c7891f34ea309b93929840c53602f342db2448bf51e434f1213a1705608f531a0537a578e84d1a787c108031d3ad4573e8a68f356f79fd22ae1c36fe1f28317859f4ed600b0c9dfe4dd2dbeb9966d0f9e09976865bb91c11d2ef876b9b8ac57cf29cc4666372b6e4da45df661e5c7e9b0c057c7f2637892aa3a9c58c9edcfb1ddb449f4fbb8701ce1701d7d70d441c7252acf41bd24c676713411f15068852f322edb7a959ad4955c83825026ed52a4af884021b96e1fd2f5cb32677145ab3e538c0c7888aebf28afc3422f4ac23229b8b52da79a5ba026a98f7c703e9f7ecf1eafbb49bfdfcdb18f4fe2ce97e318e129a4af2e283d3258b0e73b1b525116a8c35020c27baee5b3260c8074175f48775b0984c9be3390e73053f8d598ef2a30964fd40ba7f11fa0f6bc1f17144c4e5ec0d8f11a7bb855315afc450df3a919de4d74a119d649a1829b00203eb377ef2b5cca2466f0fbf37ce8bbf0bd498811b6e8be07456691109936fe9edcda737cd3399c3064331405f1fd5ba0e189b473f6f7b862bd6e9e30ef89c6bfed9eb3641858d785f57e110652dc80752aaaa3d7f86602a9bba2a6213104257e8affe93c77744099ec3a9affa40f2a5fe5084dd12775e91d59a868f85d52dabfd3d033cad5c720f9ff6c27f0aa7575e5d0f0dd458ddf953a0e8bc265bd5ad2ba5b6b7e14ff75d94e09deb23f7261b24d9cfcf4fc566055b59c6636e9724a31d93b0713ea4644f0850a97a389a3074477be724dcd584e0225568d3ffc5f455b17ec384ea57c4ecce8cfdae3297002e66189b22c7bef646c25d32935fc449b10209a503a9a5284f6aec222b4c0e170e8f6858388b73ba3fecd631a0aa53ca66cb8541d68cc4f692d39fc53a9d032acd87ee4d5cfa52d36a3e3bee904bb9dc3056ece1c5e0bb27150abc9a50e606bd14d3691d021caf9a7a7ad96b637e0fb2ffa3f2eb107b37601fd6b1f6734774e500cac3833ac410b913086f02355f93d486d20b1dac03781e7cda10fbd10fba297ff3389b1aff5a89a1115f5a7ec44e22a82f366a532a47aa8aee6e7235248d6e17cc40ab3e09d571e5153e3a4b3479bf5e402647a5fa9abdeb0777efa8609df3d7ca95a80a2424dd241690db946cc29665963b280b467860d6bb9cfb22d66a5deb1cb567ba70dc42bfa16a89fa8a4a8bff5b4f97cdb1d9584039a4e006b8ebd2bc63b82eb76e36db2b5b91a711877f6fdf16d0dd4cc00023528b88ba6bae1d5909f4251333799629f4d38d1ed735ac6fecbff8331242e65f627ce6f773e36168a18036267263c5927127a82034690fb7bf17bea19cf5d27c3dc0eae92a9b4c9a720b778b6d2ce9c240932c1a087cdae4cfed986abb08f7a97d194ca043957f698f94eaa664eb72f4a5a7b1f9dfdf0856957dcd23d25b84e7020169406ae3f21729fbd9e0a8d2b0a7d425a899d54835d0c6ff7c3f3f0680197a84d8e8e945756c645d90ab24b872f84ec1a1fe7f2e36ca9fd50799e4b88097edc40d535b9e1419f4c2a648fc632471b476a359217eac178990d26c490a6839d69f3e56adf1b166b0d82b1fe69218deb49900084f9edd8ef05013296d5cd285e37b040cdfabb8f3b65bfdf5ba2144e146a8f35cb930a3720a88b7a9fe8b3d82f781d03c506e35dbd5055a1bfad0382c22c0af7956382c136baa2639d0188b14fd5e4ad36d43801d46286ff72c0faf116813f18a937d65b365f74d4e1732237c96df5967b70ca7a76bbd3bf4650ddb62e8b908dcecfc72afc07b75b0871f1388ff614202e0e69d1c29ff9bcf3f81f6ff61dc6ccdbf7996f1ba1ce7ea5cdf32cf7e851c1be04a2e359a8a83b6034fbf9422e9860e487d1afb3e707a3daf9dd6efd35fbd720e3957b5bed77021983e4122a94d1f8b18a9c0bd482b2dfa73430eae5f22e9d87eafedc3e4c93c11761e7b4e4e15d9898b26b110a7d620d01a804f04e62b89a868ed91b55985f81e4d923af79c74579878a2421d8af283093c32821b9ce3a41632248e8e8fbfef711adbcdfd23620acac79bfa3536259c27ccd3297965c6a1b532410ae97623d9dda706f4b66f8e055c5becb260341706bcb72d32029cf0cd5c39b1d66fa78b0b81c8ad5b184f24fe309d647b936664f14d374b6d3ddecfb07bbf4d641330f6a2e8144cb284b0a782776cef9d5c34e8a037c512fd33bf4cc597690b1409fd32a7541645a27363aba02598ba2efd2233f53fbefbf93cad6e8ac9a3c7e7a98f2916df2921927c9785599d521690ed328bfa427d1d254423138e8a6f0ac0eab8220bd5cd23ebe3d408bbbe21b37fb3c360087b17f738f6d226fdc3cf0092166d388245888c799ec5872908d79fb8318a601fddd6ce2a27bca9c7b2378dbb37e0313b7f6c60a436913f3dc594de3b171f612c387c8314a49d62b9b7bc7801aa0d614583b9e5b2dd1365cff0540fd0fa3a8a4c473a7a8cd732749be50713e069bc320cc0defc0e79ab904c878ddc24e1f75e340a0d0630539920614e9fd33f5199c180eb1e70788ffe8e4907b3ec60d0bd563072019f60afe2fb7befbaed0de385a4dfcd4674236547b1d65915cfbf79004a81bf8739c23852bd1357313f629abb5d275a4c995de2f6b64a76c51677a72405d99dff3caa91ddda883983f033b9eccd5a3ac3741c872090e04d0406fc7b079f0c68b500f26a69f0249c094fe91a3d47160ccbd68b5ae058344540e9fcd086e87531e35f7c4cfe83fa37422f557608fa82b71b17f1d375db35e05cf84a04620e2baec37b0f04597b18bb7581a21fe15b72a257f7d162ba77ec45dd6d88a8812e325f0309e998099c0e38dee5c5298032a899d97472284c8a0d13874a316b5c3f3b48f36117aa5d4fa77eab1b6bb3a1e7d04fe5da0354b6a3eb28e99908757635e84cbf47e9dd559f447b49bed6d6f39734d879f556d03ee857d6dc6d4e41fb8b6197fb7977c056150e100aec3e66040ccc496de251115d50eeb0bcacd3c9feacab5fa5b9d73cb1a6310ac32a29a89dc7ededeab2c05b395f51f429214c67a28c04204cc1a8dbd3e6274a59180ff9aeaef423ad577356150915bc57384d0b4d3386d507c41339c96a22d80d27938bf99cc89e5375db13d257214d4dd21c8701033d00d4415c14e60365a5ea1de202266ee4f8d2af5ee30c153a3a6ff435657fe9d789998feea489b83abb467083f6e00373baec7da8af2032a5e5d796164f8a9f107e68049c2ed2143c44a14381119c98bfa8a99798a9ea9a153c5de7338a14cd204cd2f97fa0b66f5ba7a1eb4315d7bbb8a2327125fd432490988b19b810613fde6f5205cc8945d9ce5feabdd70a74074c3f9309f22251a29d9bec2ecd36c53916d94f9d35eb32be9f8d83fbfe6d8b7e98c9d01d48d6cafaade5f723fae7fece3aee8d4b62a356b54f0ce23605d20c815a4b947027ef8daa3f3c1918911044306e7b5c6f90c613286147fcbad20869758dd26f64a609ef14e1e8ee85cfb890d33ac7dbfe07b9ed5a91a53d818c08555c3e0174f0c97ca5c75069abe799eaa233d699f8c419c8d330b24389580f73ac96f5a26025eacffcbefe7ba5424009df5635561a68c9a6331a6ae7142c0c1f4a0d562c9659d7120908f4993ceb47e420c8468323b89cf12403568abeff0614e6876f7744a45c3a18a2b439142993c444091bbcac1b0a2f99525d6e7d504339430ad9b8e3c42e191352ed55a91b283449af5040a0abb45071f82149b757e26e1d9588fcb353f2eb8e1de789268b7174a273cb5711b9fb9e750e76f6a4cdfaee7e33a6b3e3e41ba08cad8c2c7a3078005e6d1955c40b307d059bba4928577e961c1079db5dae81ed1701d91df3d083d1b415d5328c46a058b0211ea412182d6d7f7dc125799b5940193f4ebac68ae92e955a7c8bc21ccc9c63cc11a981bbe04898965684f06c1a2fd1e9ed097bd7645da6326cfc67745eb33a1f970ca338cd3aa6a7f588cbf67b9bfe5468b8ba31b40d22870d2b6df36dbe156eaddfb71fee6e5204c01932829ca8075e3dc57ff46586febe1009073348e6f2525efaa9982074c8b7c4073955cb2a613f38340494a0ced8538941bc80f2002d50968f992b2cc5cc0957fad839549eeb87357f30ebe2f63b3ee25bf633f4a95beac488746aa148305b16fec837b73fc306a601105ddd5b2d5da2f9b9b06d607a5a0c76e9523bec08aaadad5fb72e8120a237a678f68e43d033e9c9799399b4acb68e5c19f23d0e504cdea550d41d6a525d0715c80dff2c3bb96c4f70dc3fb0f5684b30f1cb5df5b0efa510fbea0c5a47a2092ac113cc25780711b3f480322d583330eac34edfcdd23305db610e7e4ec71b07859172f05d0de16fd087d2af69f68ff9a53946390a696188821c3670138666d859c6500990a1299db9dd4c4a6fd9b9a1c71d8f67121df360712ff10245a4f0ce033ce9a2ffcbfd0ede6f03fcfe44cc264d6111b4eadb2f7f1f9a9492fc0821e9d27ae00f4d8d138c7bb3742a78a24112f37f37ffc87dabb62700526d0c4b1023d9b2082ee5524b18c319d36650912075245254962065061586bde8c980b368b0b6911286849c59eb4e581307a07a42eceffe5a64acd9592f9d1c6b7f28d19340b5e88a67e0821ca4ef5f4c739378c854abe3c2fb7e5fe16d50338b7ccc5e8295c5616accbb63c9456a1c2c6811f501eb328240aae935f2e26f61766e492f315024ba472094e2a866912202662e6fe5c01a9ebfe070dbcf06e96ce013c8a8444ac0302274ce65e5ec4b9ee8d3d3df97105915a698a226f7ad8e26f87c1c59c6c21d9e81ec0e4589f0c7e58da43c643bfc713c0a2449a7c086dad4eb9ffa52ad84e17e161ed772e95aed120853a76bb600a0f2684f61514e2cbefd4f1c32d7df0791e7e4bdfd868eb5bd", 0x1000}, 0x1006) 16:29:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x7b, &(0x7f00000000c0)=[@in], 0x10) 16:29:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:05 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:29:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:29:06 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:33:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:33:49 executing program 5: r0 = socket$inet(0x10, 0x100000000000003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001200)="24000000220007031dfffd946f610500000000000500000000000000421baba20400ff7e280000001100ffffba16a0aa1c09000000000000eff24d8238cfa47e23f7efbfcd3d2929e9c6eeda", 0x4c}], 0x1}, 0x0) 16:33:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r1, 0x4, 0x2}, &(0x7f0000000400)=ANY=[@ANYBLOB="656e633d72617720686173683d736861332d353132000000000000000000000000000000f6ca1314473e709400000000000000000000000000000000000000f5396d928d70c3890000000000009b9ce87529a0c8d3514d257072a013a1e89352bcb3c8dc59e31d08de2e33b099c3aef722535696bdcf9a1cddd5945d30219f504a222114c505bd7bd5909d30940ebf49624745eb3bf09da54f937ae18b5de4a65c7a5576dd0d24164bc7a61e7e9f8ef55393afc0fab73f3a51378d4f0793bf172d2a54e92e457482dac23eed30bc3da65bd667ad246975d8fed4ef623758"], 0x0, &(0x7f0000000340)=""/132) 16:33:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 16:33:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 16:33:49 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) preadv(r0, &(0x7f0000001640)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/243, 0xf3}, {&(0x7f00000013c0)=""/200, 0xc8}, {&(0x7f00000001c0)=""/153, 0x99}, {&(0x7f00000014c0)=""/200, 0xc8}, {&(0x7f00000015c0)=""/102, 0x66}], 0x6, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 454.230719][ T8012] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 454.241524][ T8008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 454.255254][ T8016] check_preemption_disabled: 19 callbacks suppressed [ 454.255263][ T8016] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8016 [ 454.257198][ T8012] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 454.262434][ T8016] caller is sk_mc_loop+0x1d/0x210 [ 454.262469][ T8016] CPU: 1 PID: 8016 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 454.295346][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.295392][ T8016] Call Trace: [ 454.295457][ T8016] dump_stack+0x172/0x1f0 [ 454.295976][ T8016] __this_cpu_preempt_check+0x246/0x270 [ 454.307552][ T8012] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 454.309535][ T8016] sk_mc_loop+0x1d/0x210 [ 454.309600][ T8016] ip_mc_output+0x2ef/0xf70 [ 454.309617][ T8016] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 454.318330][ T8020] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 454.319904][ T8016] ? ip_append_data.part.0+0x170/0x170 [ 454.319922][ T8016] ? ip_make_skb+0x1b1/0x2c0 [ 454.334221][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 454.334233][ T8016] ip_local_out+0xc4/0x1b0 [ 454.334244][ T8016] ip_send_skb+0x42/0xf0 [ 454.334282][ T8016] udp_send_skb.isra.0+0x6b2/0x1180 [ 454.334325][ T8016] ? xfrm_lookup_route+0x5b/0x1f0 [ 454.334343][ T8016] udp_sendmsg+0x1dfd/0x2820 [ 454.392774][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 454.397802][ T8016] ? find_held_lock+0x35/0x130 [ 454.403113][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 454.408381][ T8016] ? udp4_lib_lookup_skb+0x440/0x440 [ 454.413793][ T8016] udpv6_sendmsg+0x13a4/0x28d0 [ 454.418775][ T8016] ? udpv6_sendmsg+0x13a4/0x28d0 [ 454.423917][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 454.430530][ T8016] ? aa_profile_af_perm+0x320/0x320 [ 454.435770][ T8016] ? __might_fault+0x12b/0x1e0 [ 454.440626][ T8016] ? find_held_lock+0x35/0x130 [ 454.445653][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.452022][ T8016] ? rw_copy_check_uvector+0x2a6/0x330 [ 454.457616][ T8016] ? ___might_sleep+0x163/0x280 [ 454.462924][ T8016] ? __might_sleep+0x95/0x190 [ 454.467647][ T8016] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 454.473397][ T8016] ? aa_sk_perm+0x288/0x880 [ 454.477953][ T8016] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 454.483532][ T8016] inet_sendmsg+0x147/0x5e0 [ 454.488102][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 454.494110][ T8016] ? inet_sendmsg+0x147/0x5e0 [ 454.498823][ T8016] ? ipip_gro_receive+0x100/0x100 [ 454.503875][ T8016] sock_sendmsg+0xdd/0x130 [ 454.508333][ T8016] ___sys_sendmsg+0x3e2/0x930 [ 454.513147][ T8016] ? copy_msghdr_from_user+0x430/0x430 [ 454.518644][ T8016] ? lock_downgrade+0x880/0x880 [ 454.523538][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.529837][ T8016] ? kasan_check_read+0x11/0x20 [ 454.534887][ T8016] ? __fget+0x381/0x550 [ 454.539105][ T8016] ? ksys_dup3+0x3e0/0x3e0 [ 454.543576][ T8016] ? __fget_light+0x1a9/0x230 [ 454.548463][ T8016] ? __fdget+0x1b/0x20 [ 454.552670][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.559104][ T8016] ? sockfd_lookup_light+0xcb/0x180 [ 454.564359][ T8016] __sys_sendmmsg+0x1bf/0x4d0 [ 454.569823][ T8016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 454.575089][ T8016] ? _copy_to_user+0xc9/0x120 [ 454.579900][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.586374][ T8016] ? put_timespec64+0xda/0x140 [ 454.591179][ T8016] ? nsecs_to_jiffies+0x30/0x30 [ 454.596126][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 454.601725][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 454.607214][ T8016] ? do_syscall_64+0x26/0x610 [ 454.611933][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.618144][ T8016] ? do_syscall_64+0x26/0x610 [ 454.622947][ T8016] __x64_sys_sendmmsg+0x9d/0x100 [ 454.627948][ T8016] do_syscall_64+0x103/0x610 [ 454.632574][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.638651][ T8016] RIP: 0033:0x4582b9 [ 454.642635][ T8016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.666913][ T8016] RSP: 002b:00007f640fcd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 16:33:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 16:33:50 executing program 5: r0 = socket$inet(0x10, 0x100000000000003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001200)="24000000220007031dfffd946f610500000000000500000000000000421baba20400ff7e280000001100ffffba16a0aa1c09000000000000eff24d8238cfa47e23f7efbfcd3d2929e9c6eeda", 0x4c}], 0x1}, 0x0) [ 454.675934][ T8016] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 454.684908][ T8016] RDX: 04000000000000ce RSI: 00000000200002c0 RDI: 0000000000000003 [ 454.693198][ T8016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 454.701564][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f640fcd66d4 [ 454.710196][ T8016] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff [ 454.732010][ T8016] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8016 [ 454.741485][ T8016] caller is sk_mc_loop+0x1d/0x210 [ 454.747136][ T8016] CPU: 0 PID: 8016 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 454.756704][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.767131][ T8016] Call Trace: [ 454.770475][ T8016] dump_stack+0x172/0x1f0 [ 454.773987][ T8024] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 454.775121][ T8016] __this_cpu_preempt_check+0x246/0x270 [ 454.775149][ T8016] sk_mc_loop+0x1d/0x210 [ 454.795128][ T8016] ip_mc_output+0x2ef/0xf70 [ 454.799743][ T8016] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 454.800288][ T8024] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 454.804980][ T8016] ? ip_append_data.part.0+0x170/0x170 [ 454.804994][ T8016] ? ip_make_skb+0x1b1/0x2c0 [ 454.805007][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 454.805022][ T8016] ip_local_out+0xc4/0x1b0 [ 454.805038][ T8016] ip_send_skb+0x42/0xf0 [ 454.805054][ T8016] udp_send_skb.isra.0+0x6b2/0x1180 [ 454.805069][ T8016] ? xfrm_lookup_route+0x5b/0x1f0 [ 454.805089][ T8016] udp_sendmsg+0x1dfd/0x2820 [ 454.805104][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 454.805115][ T8016] ? find_held_lock+0x35/0x130 [ 454.805132][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 454.805152][ T8016] ? udp4_lib_lookup_skb+0x440/0x440 [ 454.805206][ T8016] udpv6_sendmsg+0x13a4/0x28d0 [ 454.879062][ T8016] ? udpv6_sendmsg+0x13a4/0x28d0 [ 454.885053][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 454.891052][ T8016] ? aa_profile_af_perm+0x320/0x320 [ 454.896263][ T8016] ? __might_fault+0x12b/0x1e0 [ 454.901033][ T8016] ? find_held_lock+0x35/0x130 [ 454.905810][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.912256][ T8016] ? rw_copy_check_uvector+0x2a6/0x330 [ 454.917842][ T8016] ? ___might_sleep+0x163/0x280 [ 454.922796][ T8016] ? __might_sleep+0x95/0x190 [ 454.927486][ T8016] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 454.934106][ T8016] ? aa_sk_perm+0x288/0x880 [ 454.938625][ T8016] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 454.944189][ T8016] inet_sendmsg+0x147/0x5e0 [ 454.948717][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 454.954789][ T8016] ? inet_sendmsg+0x147/0x5e0 [ 454.959475][ T8016] ? ipip_gro_receive+0x100/0x100 [ 454.964545][ T8016] sock_sendmsg+0xdd/0x130 [ 454.968974][ T8016] ___sys_sendmsg+0x3e2/0x930 [ 454.973679][ T8016] ? copy_msghdr_from_user+0x430/0x430 [ 454.979185][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 454.984133][ T8016] ? lock_downgrade+0x880/0x880 [ 454.988993][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.995288][ T8016] ? kasan_check_read+0x11/0x20 [ 455.000417][ T8016] ? __might_fault+0x12b/0x1e0 [ 455.005326][ T8016] ? find_held_lock+0x35/0x130 [ 455.010482][ T8016] ? __might_fault+0x12b/0x1e0 [ 455.015364][ T8016] ? lock_downgrade+0x880/0x880 [ 455.031261][ T8016] ? ___might_sleep+0x163/0x280 [ 455.036201][ T8016] __sys_sendmmsg+0x1bf/0x4d0 [ 455.041874][ T8016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 455.046937][ T8016] ? _copy_to_user+0xc9/0x120 [ 455.051694][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 455.058274][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 455.064725][ T8016] ? put_timespec64+0xda/0x140 [ 455.069519][ T8016] ? nsecs_to_jiffies+0x30/0x30 [ 455.074743][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.080304][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.085782][ T8016] ? do_syscall_64+0x26/0x610 [ 455.090490][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.096910][ T8016] ? do_syscall_64+0x26/0x610 [ 455.101677][ T8016] __x64_sys_sendmmsg+0x9d/0x100 [ 455.106629][ T8016] do_syscall_64+0x103/0x610 [ 455.111424][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.117409][ T8016] RIP: 0033:0x4582b9 [ 455.121312][ T8016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.141054][ T8016] RSP: 002b:00007f640fcd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 455.149634][ T8016] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 455.158118][ T8016] RDX: 04000000000000ce RSI: 00000000200002c0 RDI: 0000000000000003 [ 455.166121][ T8016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 455.174294][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f640fcd66d4 16:33:50 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x0, 0x4, 0x4}, 0xfb8d}}, 0x18) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, {0x6, 0x80000001, 0x807c, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1cb1}}, {0x0, 0xfffffffffffffffe}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r2) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r3, &(0x7f0000000240)='cmdline\x00') ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000180)={0x3f, "560814020accbf9a586f95f71dade82ad5fc29301e49d2b816c7f179b9652550", 0x1}) rt_sigaction(0x13, 0x0, 0x0, 0x8, &(0x7f0000000280)) keyctl$assume_authority(0x10, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x0, 0x200, 0xac, 0x0, 0x7, 0x5, 0x1, 0x1, 0x0, 0x6, 0x8, 0x8, 0xffffffffffffff43, 0x3, 0x4, 0x3, 0x0, 0x6, 0x2b68b50b, 0x8, 0xac6f, 0x9, 0x4, 0x8, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 16:33:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) [ 455.182292][ T8016] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff 16:33:50 executing program 5: r0 = socket$inet(0x10, 0x100000000000003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001200)="24000000220007031dfffd946f610500000000000500000000000000421baba20400ff7e280000001100ffffba16a0aa1c09000000000000eff24d8238cfa47e23f7efbfcd3d2929e9c6eeda", 0x4c}], 0x1}, 0x0) [ 455.231292][ T8028] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 455.237438][ T8016] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8016 [ 455.250150][ T8016] caller is sk_mc_loop+0x1d/0x210 [ 455.255978][ T8016] CPU: 0 PID: 8016 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 455.265107][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.275545][ T8016] Call Trace: [ 455.278909][ T8016] dump_stack+0x172/0x1f0 [ 455.278937][ T8016] __this_cpu_preempt_check+0x246/0x270 [ 455.278968][ T8016] sk_mc_loop+0x1d/0x210 [ 455.278995][ T8016] ip_mc_output+0x2ef/0xf70 [ 455.279011][ T8016] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 455.279026][ T8016] ? ip_append_data.part.0+0x170/0x170 [ 455.279038][ T8016] ? ip_make_skb+0x1b1/0x2c0 [ 455.309224][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 455.319678][ T8016] ip_local_out+0xc4/0x1b0 [ 455.324127][ T8016] ip_send_skb+0x42/0xf0 [ 455.328405][ T8016] udp_send_skb.isra.0+0x6b2/0x1180 [ 455.333654][ T8016] ? xfrm_lookup_route+0x5b/0x1f0 [ 455.338734][ T8016] udp_sendmsg+0x1dfd/0x2820 [ 455.343380][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 455.348357][ T8016] ? find_held_lock+0x35/0x130 [ 455.353153][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 455.358231][ T8016] ? udp4_lib_lookup_skb+0x440/0x440 [ 455.363590][ T8016] udpv6_sendmsg+0x13a4/0x28d0 [ 455.368570][ T8016] ? udpv6_sendmsg+0x13a4/0x28d0 [ 455.374112][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 455.380264][ T8016] ? aa_profile_af_perm+0x320/0x320 [ 455.385490][ T8016] ? __might_fault+0x12b/0x1e0 [ 455.390402][ T8016] ? find_held_lock+0x35/0x130 [ 455.395367][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 455.401649][ T8016] ? rw_copy_check_uvector+0x2a6/0x330 [ 455.407158][ T8016] ? ___might_sleep+0x163/0x280 [ 455.412152][ T8016] ? __might_sleep+0x95/0x190 [ 455.417303][ T8016] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 455.423160][ T8016] ? aa_sk_perm+0x288/0x880 [ 455.427880][ T8016] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 455.433574][ T8016] inet_sendmsg+0x147/0x5e0 [ 455.438975][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 455.445070][ T8016] ? inet_sendmsg+0x147/0x5e0 [ 455.449770][ T8016] ? ipip_gro_receive+0x100/0x100 [ 455.458923][ T8016] sock_sendmsg+0xdd/0x130 [ 455.463363][ T8016] ___sys_sendmsg+0x3e2/0x930 [ 455.468084][ T8016] ? copy_msghdr_from_user+0x430/0x430 [ 455.473580][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 455.478549][ T8016] ? lock_downgrade+0x880/0x880 [ 455.483678][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.496111][ T8016] ? kasan_check_read+0x11/0x20 [ 455.501143][ T8016] ? __might_fault+0x12b/0x1e0 [ 455.506382][ T8016] ? find_held_lock+0x35/0x130 [ 455.511242][ T8016] ? __might_fault+0x12b/0x1e0 [ 455.516022][ T8016] ? lock_downgrade+0x880/0x880 [ 455.521070][ T8016] ? ___might_sleep+0x163/0x280 [ 455.526063][ T8016] __sys_sendmmsg+0x1bf/0x4d0 [ 455.530777][ T8016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 455.535836][ T8016] ? _copy_to_user+0xc9/0x120 [ 455.540631][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 455.546896][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 455.553246][ T8016] ? put_timespec64+0xda/0x140 [ 455.558081][ T8016] ? nsecs_to_jiffies+0x30/0x30 [ 455.563066][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.568549][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.574053][ T8016] ? do_syscall_64+0x26/0x610 [ 455.578782][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.584883][ T8016] ? do_syscall_64+0x26/0x610 [ 455.589695][ T8016] __x64_sys_sendmmsg+0x9d/0x100 [ 455.594746][ T8016] do_syscall_64+0x103/0x610 [ 455.599446][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.605370][ T8016] RIP: 0033:0x4582b9 [ 455.609290][ T8016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.629114][ T8016] RSP: 002b:00007f640fcd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 455.637561][ T8016] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 455.645647][ T8016] RDX: 04000000000000ce RSI: 00000000200002c0 RDI: 0000000000000003 [ 455.653656][ T8016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 455.661657][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f640fcd66d4 [ 455.670206][ T8016] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff 16:33:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 455.706931][ T26] audit: type=1800 audit(1554568431.245:60): pid=8032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16571 res=0 [ 455.717955][ T8037] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 455.737225][ T8035] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 455.791294][ T26] audit: type=1804 audit(1554568431.265:61): pid=8032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir722394026/syzkaller.hK64tu/4/file0/file0" dev="sda1" ino=16571 res=1 [ 455.858001][ T26] audit: type=1800 audit(1554568431.265:62): pid=8032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16571 res=0 16:33:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) 16:33:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 16:33:51 executing program 5: r0 = socket$inet(0x10, 0x100000000000003, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001200)="24000000220007031dfffd946f610500000000000500000000000000421baba20400ff7e280000001100ffffba16a0aa1c09000000000000eff24d8238cfa47e23f7efbfcd3d2929e9c6eeda", 0x4c}], 0x1}, 0x0) 16:33:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 456.063198][ T8016] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8016 [ 456.073083][ T8016] caller is sk_mc_loop+0x1d/0x210 [ 456.078145][ T8016] CPU: 1 PID: 8016 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 456.087186][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.087193][ T8016] Call Trace: [ 456.087222][ T8016] dump_stack+0x172/0x1f0 [ 456.087245][ T8016] __this_cpu_preempt_check+0x246/0x270 [ 456.087262][ T8016] sk_mc_loop+0x1d/0x210 [ 456.087279][ T8016] ip_mc_output+0x2ef/0xf70 [ 456.087303][ T8016] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 456.087318][ T8016] ? ip_append_data.part.0+0x170/0x170 [ 456.087329][ T8016] ? ip_make_skb+0x1b1/0x2c0 [ 456.087340][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 456.087354][ T8016] ip_local_out+0xc4/0x1b0 [ 456.087368][ T8016] ip_send_skb+0x42/0xf0 [ 456.087384][ T8016] udp_send_skb.isra.0+0x6b2/0x1180 [ 456.115445][ T8016] ? xfrm_lookup_route+0x5b/0x1f0 [ 456.115470][ T8016] udp_sendmsg+0x1dfd/0x2820 [ 456.115487][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 456.115498][ T8016] ? find_held_lock+0x35/0x130 [ 456.115529][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 456.115546][ T8016] ? udp4_lib_lookup_skb+0x440/0x440 [ 456.115595][ T8016] udpv6_sendmsg+0x13a4/0x28d0 [ 456.196791][ T8016] ? udpv6_sendmsg+0x13a4/0x28d0 [ 456.202117][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 456.208151][ T8016] ? aa_profile_af_perm+0x320/0x320 [ 456.213479][ T8016] ? __might_fault+0x12b/0x1e0 [ 456.218296][ T8016] ? find_held_lock+0x35/0x130 [ 456.223124][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.229406][ T8016] ? rw_copy_check_uvector+0x2a6/0x330 [ 456.234916][ T8016] ? ___might_sleep+0x163/0x280 [ 456.239786][ T8016] ? __might_sleep+0x95/0x190 [ 456.244479][ T8016] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 456.250135][ T8016] ? aa_sk_perm+0x288/0x880 [ 456.254662][ T8016] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 456.260316][ T8016] inet_sendmsg+0x147/0x5e0 [ 456.264928][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 456.270919][ T8016] ? inet_sendmsg+0x147/0x5e0 [ 456.275609][ T8016] ? ipip_gro_receive+0x100/0x100 [ 456.280749][ T8016] sock_sendmsg+0xdd/0x130 [ 456.285224][ T8016] ___sys_sendmsg+0x3e2/0x930 [ 456.289976][ T8016] ? copy_msghdr_from_user+0x430/0x430 [ 456.295462][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 456.300425][ T8016] ? lock_downgrade+0x880/0x880 [ 456.305765][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.312132][ T8016] ? kasan_check_read+0x11/0x20 [ 456.317103][ T8016] ? __might_fault+0x12b/0x1e0 [ 456.322126][ T8016] ? find_held_lock+0x35/0x130 [ 456.327382][ T8016] ? __might_fault+0x12b/0x1e0 [ 456.332173][ T8016] ? lock_downgrade+0x880/0x880 [ 456.337219][ T8016] ? ___might_sleep+0x163/0x280 [ 456.342091][ T8016] __sys_sendmmsg+0x1bf/0x4d0 [ 456.346807][ T8016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 456.351855][ T8016] ? _copy_to_user+0xc9/0x120 [ 456.356559][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.362813][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.369977][ T8016] ? put_timespec64+0xda/0x140 [ 456.374771][ T8016] ? nsecs_to_jiffies+0x30/0x30 [ 456.379912][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 456.385383][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 456.390882][ T8016] ? do_syscall_64+0x26/0x610 [ 456.395584][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.401690][ T8016] ? do_syscall_64+0x26/0x610 [ 456.406640][ T8016] __x64_sys_sendmmsg+0x9d/0x100 [ 456.411837][ T8016] do_syscall_64+0x103/0x610 [ 456.416565][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.422661][ T8016] RIP: 0033:0x4582b9 [ 456.426582][ T8016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.446209][ T8016] RSP: 002b:00007f640fcd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 456.454729][ T8016] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 16:33:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 456.462779][ T8016] RDX: 04000000000000ce RSI: 00000000200002c0 RDI: 0000000000000003 [ 456.470859][ T8016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 456.478958][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f640fcd66d4 [ 456.487032][ T8016] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff [ 456.568566][ T8067] dccp_invalid_packet: P.Data Offset(68) too large [ 456.589249][ T8016] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8016 [ 456.599103][ T8016] caller is sk_mc_loop+0x1d/0x210 [ 456.604321][ T8016] CPU: 0 PID: 8016 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 456.609575][ T8071] dccp_invalid_packet: P.Data Offset(68) too large [ 456.613537][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.613544][ T8016] Call Trace: [ 456.613570][ T8016] dump_stack+0x172/0x1f0 [ 456.613592][ T8016] __this_cpu_preempt_check+0x246/0x270 [ 456.613620][ T8016] sk_mc_loop+0x1d/0x210 [ 456.648431][ T8016] ip_mc_output+0x2ef/0xf70 [ 456.653144][ T8016] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 456.658299][ T8016] ? ip_append_data.part.0+0x170/0x170 [ 456.663789][ T8016] ? ip_make_skb+0x1b1/0x2c0 [ 456.668387][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 456.673440][ T8016] ip_local_out+0xc4/0x1b0 [ 456.677984][ T8016] ip_send_skb+0x42/0xf0 [ 456.682414][ T8016] udp_send_skb.isra.0+0x6b2/0x1180 [ 456.687621][ T8016] ? xfrm_lookup_route+0x5b/0x1f0 [ 456.692666][ T8016] udp_sendmsg+0x1dfd/0x2820 [ 456.697807][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 456.702747][ T8016] ? find_held_lock+0x35/0x130 [ 456.707542][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 456.712586][ T8016] ? udp4_lib_lookup_skb+0x440/0x440 [ 456.717928][ T8016] udpv6_sendmsg+0x13a4/0x28d0 [ 456.722701][ T8016] ? udpv6_sendmsg+0x13a4/0x28d0 [ 456.727666][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 456.734201][ T8016] ? aa_profile_af_perm+0x320/0x320 [ 456.739429][ T8016] ? __might_fault+0x12b/0x1e0 [ 456.744224][ T8016] ? find_held_lock+0x35/0x130 [ 456.749008][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.755264][ T8016] ? rw_copy_check_uvector+0x2a6/0x330 [ 456.760763][ T8016] ? ___might_sleep+0x163/0x280 [ 456.765626][ T8016] ? __might_sleep+0x95/0x190 [ 456.770427][ T8016] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 456.776073][ T8016] ? aa_sk_perm+0x288/0x880 [ 456.780598][ T8016] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 456.786176][ T8016] inet_sendmsg+0x147/0x5e0 [ 456.790693][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 456.796781][ T8016] ? inet_sendmsg+0x147/0x5e0 [ 456.801467][ T8016] ? ipip_gro_receive+0x100/0x100 [ 456.806516][ T8016] sock_sendmsg+0xdd/0x130 [ 456.810946][ T8016] ___sys_sendmsg+0x3e2/0x930 [ 456.815636][ T8016] ? copy_msghdr_from_user+0x430/0x430 [ 456.821461][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 456.826423][ T8016] ? lock_downgrade+0x880/0x880 [ 456.831462][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.837721][ T8016] ? kasan_check_read+0x11/0x20 [ 456.842587][ T8016] ? __might_fault+0x12b/0x1e0 [ 456.847368][ T8016] ? find_held_lock+0x35/0x130 [ 456.852574][ T8016] ? __might_fault+0x12b/0x1e0 [ 456.857460][ T8016] ? lock_downgrade+0x880/0x880 [ 456.862504][ T8016] ? ___might_sleep+0x163/0x280 [ 456.867377][ T8016] __sys_sendmmsg+0x1bf/0x4d0 [ 456.872102][ T8016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 456.877162][ T8016] ? _copy_to_user+0xc9/0x120 [ 456.881902][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.888157][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 456.894504][ T8016] ? put_timespec64+0xda/0x140 [ 456.899283][ T8016] ? nsecs_to_jiffies+0x30/0x30 [ 456.904146][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 456.909710][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 456.915265][ T8016] ? do_syscall_64+0x26/0x610 [ 456.919943][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.926036][ T8016] ? do_syscall_64+0x26/0x610 [ 456.930724][ T8016] __x64_sys_sendmmsg+0x9d/0x100 [ 456.935669][ T8016] do_syscall_64+0x103/0x610 [ 456.940266][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.946163][ T8016] RIP: 0033:0x4582b9 [ 456.950066][ T8016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.969857][ T8016] RSP: 002b:00007f640fcd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 456.978580][ T8016] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 456.986843][ T8016] RDX: 04000000000000ce RSI: 00000000200002c0 RDI: 0000000000000003 [ 456.995018][ T8016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 457.003021][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f640fcd66d4 [ 457.011006][ T8016] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff [ 457.092471][ T26] audit: type=1800 audit(1554568432.625:63): pid=8070 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=114 res=0 [ 457.104983][ T8016] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.2/8016 [ 457.124945][ T8016] caller is sk_mc_loop+0x1d/0x210 [ 457.129996][ T8016] CPU: 1 PID: 8016 Comm: syz-executor.2 Not tainted 5.1.0-rc3-next-20190405 #19 [ 457.139113][ T8016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.149289][ T8016] Call Trace: [ 457.152636][ T8016] dump_stack+0x172/0x1f0 [ 457.157286][ T8016] __this_cpu_preempt_check+0x246/0x270 [ 457.163120][ T8016] sk_mc_loop+0x1d/0x210 [ 457.167470][ T8016] ip_mc_output+0x2ef/0xf70 [ 457.172095][ T8016] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 457.177234][ T8016] ? ip_append_data.part.0+0x170/0x170 [ 457.182704][ T8016] ? ip_make_skb+0x1b1/0x2c0 [ 457.187307][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 457.192433][ T8016] ip_local_out+0xc4/0x1b0 [ 457.196867][ T8016] ip_send_skb+0x42/0xf0 [ 457.201127][ T8016] udp_send_skb.isra.0+0x6b2/0x1180 [ 457.206336][ T8016] ? xfrm_lookup_route+0x5b/0x1f0 [ 457.211394][ T8016] udp_sendmsg+0x1dfd/0x2820 [ 457.216020][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 457.220963][ T8016] ? find_held_lock+0x35/0x130 [ 457.225830][ T8016] ? ip_reply_glue_bits+0xc0/0xc0 [ 457.230877][ T8016] ? udp4_lib_lookup_skb+0x440/0x440 [ 457.236223][ T8016] udpv6_sendmsg+0x13a4/0x28d0 [ 457.240999][ T8016] ? udpv6_sendmsg+0x13a4/0x28d0 [ 457.245960][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 457.252024][ T8016] ? aa_profile_af_perm+0x320/0x320 [ 457.257248][ T8016] ? __might_fault+0x12b/0x1e0 [ 457.262038][ T8016] ? find_held_lock+0x35/0x130 [ 457.266830][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 457.273098][ T8016] ? rw_copy_check_uvector+0x2a6/0x330 [ 457.278683][ T8016] ? ___might_sleep+0x163/0x280 [ 457.283652][ T8016] ? __might_sleep+0x95/0x190 [ 457.288437][ T8016] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 457.294124][ T8016] ? aa_sk_perm+0x288/0x880 [ 457.298663][ T8016] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 457.304339][ T8016] inet_sendmsg+0x147/0x5e0 [ 457.308876][ T8016] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 457.314875][ T8016] ? inet_sendmsg+0x147/0x5e0 [ 457.319571][ T8016] ? ipip_gro_receive+0x100/0x100 [ 457.324727][ T8016] sock_sendmsg+0xdd/0x130 [ 457.329276][ T8016] ___sys_sendmsg+0x3e2/0x930 [ 457.333981][ T8016] ? copy_msghdr_from_user+0x430/0x430 [ 457.339464][ T8016] ? __lock_acquire+0x548/0x3fb0 [ 457.344430][ T8016] ? lock_downgrade+0x880/0x880 [ 457.349303][ T8016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.355568][ T8016] ? kasan_check_read+0x11/0x20 [ 457.360705][ T8016] ? __might_fault+0x12b/0x1e0 [ 457.360723][ T8016] ? find_held_lock+0x35/0x130 [ 457.360736][ T8016] ? __might_fault+0x12b/0x1e0 [ 457.360757][ T8016] ? lock_downgrade+0x880/0x880 [ 457.370393][ T8016] ? ___might_sleep+0x163/0x280 [ 457.370411][ T8016] __sys_sendmmsg+0x1bf/0x4d0 [ 457.370430][ T8016] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 457.370454][ T8016] ? _copy_to_user+0xc9/0x120 [ 457.399439][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 457.405691][ T8016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 457.411938][ T8016] ? put_timespec64+0xda/0x140 [ 457.416723][ T8016] ? nsecs_to_jiffies+0x30/0x30 [ 457.421612][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 457.427091][ T8016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 457.432560][ T8016] ? do_syscall_64+0x26/0x610 [ 457.437255][ T8016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.443358][ T8016] ? do_syscall_64+0x26/0x610 [ 457.448048][ T8016] __x64_sys_sendmmsg+0x9d/0x100 [ 457.453103][ T8016] do_syscall_64+0x103/0x610 [ 457.457702][ T8016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.463640][ T8016] RIP: 0033:0x4582b9 [ 457.467546][ T8016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 457.487172][ T8016] RSP: 002b:00007f640fcd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 457.495624][ T8016] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 457.503788][ T8016] RDX: 04000000000000ce RSI: 00000000200002c0 RDI: 0000000000000003 [ 457.511783][ T8016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 457.519768][ T8016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f640fcd66d4 [ 457.528216][ T8016] R13: 00000000004c5230 R14: 00000000004d9380 R15: 00000000ffffffff 16:33:53 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x980915, 0x2}) 16:33:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 16:33:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:33:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 16:33:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x0, 0x4, 0x4}, 0xfb8d}}, 0x18) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, {0x6, 0x80000001, 0x807c, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1cb1}}, {0x0, 0xfffffffffffffffe}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r2) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r3, &(0x7f0000000240)='cmdline\x00') ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000180)={0x3f, "560814020accbf9a586f95f71dade82ad5fc29301e49d2b816c7f179b9652550", 0x1}) rt_sigaction(0x13, 0x0, 0x0, 0x8, &(0x7f0000000280)) keyctl$assume_authority(0x10, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x0, 0x200, 0xac, 0x0, 0x7, 0x5, 0x1, 0x1, 0x0, 0x6, 0x8, 0x8, 0xffffffffffffff43, 0x3, 0x4, 0x3, 0x0, 0x6, 0x2b68b50b, 0x8, 0xac6f, 0x9, 0x4, 0x8, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 16:33:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, r1}) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac140003000000ac141414ff0900ffe0000002efffffff68000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000380)) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r8 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r7, &(0x7f0000000400)="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", 0x200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000200)={0x7, 0x0, 0x1000000000000, 0x7, 0x10000, 0x80}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0xb, 0x8200, 0x6, 0xfffffffffffffffa, 0x100000001, 0x80000000, 0x5b5, r5}, &(0x7f0000000300)=0x20) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0xfd) sendfile(r7, r8, 0x0, 0x10000) [ 457.645686][ T8083] dccp_invalid_packet: P.Data Offset(68) too large 16:33:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 16:33:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 16:33:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:33:53 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x980915, 0x2}) [ 457.901242][ T8107] dccp_invalid_packet: P.Data Offset(68) too large 16:33:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:33:53 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x980915, 0x2}) [ 458.084976][ T8116] dccp_invalid_packet: P.Data Offset(68) too large 16:33:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 16:33:53 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x980915, 0x2}) 16:33:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x0, 0x4, 0x4}, 0xfb8d}}, 0x18) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, {0x6, 0x80000001, 0x807c, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1cb1}}, {0x0, 0xfffffffffffffffe}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r2) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r3, &(0x7f0000000240)='cmdline\x00') ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000180)={0x3f, "560814020accbf9a586f95f71dade82ad5fc29301e49d2b816c7f179b9652550", 0x1}) rt_sigaction(0x13, 0x0, 0x0, 0x8, &(0x7f0000000280)) keyctl$assume_authority(0x10, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x0, 0x200, 0xac, 0x0, 0x7, 0x5, 0x1, 0x1, 0x0, 0x6, 0x8, 0x8, 0xffffffffffffff43, 0x3, 0x4, 0x3, 0x0, 0x6, 0x2b68b50b, 0x8, 0xac6f, 0x9, 0x4, 0x8, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 16:33:53 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) 16:33:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{0x801}, {0x801, 0x0, 0x0, 0x8}]}) 16:33:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x20ae, 0x0) 16:33:53 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)) 16:33:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x61) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 16:33:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x20ae, 0x0) 16:33:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{0x801}, {0x801, 0x0, 0x0, 0x8}]}) 16:33:54 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) 16:33:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)) 16:33:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x20ae, 0x0) 16:33:54 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) getgid() ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r1, 0x805, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) 16:33:54 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x201, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x0, 0x4, 0x4}, 0xfb8d}}, 0x18) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfff, {0x6, 0x80000001, 0x807c, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1cb1}}, {0x0, 0xfffffffffffffffe}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r2) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r3, &(0x7f0000000240)='cmdline\x00') ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000180)={0x3f, "560814020accbf9a586f95f71dade82ad5fc29301e49d2b816c7f179b9652550", 0x1}) rt_sigaction(0x13, 0x0, 0x0, 0x8, &(0x7f0000000280)) keyctl$assume_authority(0x10, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video1\x00', 0x2, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x0, 0x200, 0xac, 0x0, 0x7, 0x5, 0x1, 0x1, 0x0, 0x6, 0x8, 0x8, 0xffffffffffffff43, 0x3, 0x4, 0x3, 0x0, 0x6, 0x2b68b50b, 0x8, 0xac6f, 0x9, 0x4, 0x8, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 16:33:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{0x801}, {0x801, 0x0, 0x0, 0x8}]}) 16:33:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)) 16:33:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x20ae, 0x0) 16:33:54 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) 16:33:54 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)) 16:33:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x19, &(0x7f0000000380), 0x4) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000002b80)={&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x2061) 16:33:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, [], [{0x801}, {0x801, 0x0, 0x0, 0x8}]}) 16:33:54 executing program 5: mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5411, &(0x7f0000000000)) 16:33:54 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x84) 16:33:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000440)={r3}) 16:33:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007041dfffd946f610500020000031f000000000008000800030004", 0x21}], 0x1}, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0x7200) 16:33:54 executing program 5: mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5411, &(0x7f0000000000)) 16:33:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet6(r1, 0x0, 0x0, 0x20040880, &(0x7f0000000200)={0xa, 0x4004e22, 0x0, @loopback}, 0x1c) [ 459.227797][ T8208] irq bypass consumer (token 00000000bc51273a) registration fails: -16 16:33:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x6, 0x600000000000000, [0x40000021, 0x0, 0x1b], [0xc2]}) 16:33:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000418e00000004fcff", 0x58}], 0x1) [ 459.317222][ T8215] check_preemption_disabled: 81 callbacks suppressed [ 459.317276][ T8215] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8215 [ 459.335344][ T8215] caller is ip6_finish_output+0x335/0xdc0 [ 459.335382][ T8215] CPU: 0 PID: 8215 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 459.335392][ T8215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.335398][ T8215] Call Trace: [ 459.335426][ T8215] dump_stack+0x172/0x1f0 [ 459.362611][ T8215] __this_cpu_preempt_check+0x246/0x270 [ 459.362633][ T8215] ip6_finish_output+0x335/0xdc0 [ 459.362653][ T8215] ip6_output+0x235/0x7f0 [ 459.362671][ T8215] ? ip6_finish_output+0xdc0/0xdc0 [ 459.362693][ T8215] ? ip6_fragment+0x3980/0x3980 [ 459.400168][ T8215] ip6_xmit+0xe41/0x20c0 [ 459.404859][ T8215] ? ip6_finish_output2+0x2550/0x2550 [ 459.410609][ T8215] ? mark_held_locks+0xf0/0xf0 16:33:55 executing program 5: mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5411, &(0x7f0000000000)) [ 459.415781][ T8215] ? ip6_setup_cork+0x1870/0x1870 [ 459.421214][ T8215] inet6_csk_xmit+0x2fb/0x5d0 [ 459.426116][ T8215] ? inet6_csk_update_pmtu+0x190/0x190 [ 459.431973][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.431995][ T8215] ? csum_ipv6_magic+0x20/0x80 [ 459.432018][ T8215] __tcp_transmit_skb+0x1a32/0x3750 [ 459.432043][ T8215] ? __tcp_select_window+0x8b0/0x8b0 [ 459.455560][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.455579][ T8215] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 459.455595][ T8215] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 459.455611][ T8215] tcp_connect+0x1e47/0x4280 [ 459.455635][ T8215] ? tcp_push_one+0x110/0x110 [ 459.455696][ T8215] ? secure_tcpv6_ts_off+0x24f/0x360 [ 459.455714][ T8215] ? secure_dccpv6_sequence_number+0x280/0x280 [ 459.455727][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.455749][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.513612][ T8215] ? prandom_u32_state+0x13/0x180 16:33:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000418e00000004fcff", 0x58}], 0x1) [ 459.518805][ T8215] tcp_v6_connect+0x150b/0x20a0 [ 459.524890][ T8215] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 459.530931][ T8215] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 459.536341][ T8215] ? __switch_to_asm+0x34/0x70 [ 459.541489][ T8215] ? __switch_to_asm+0x40/0x70 [ 459.546411][ T8215] ? find_held_lock+0x35/0x130 [ 459.546430][ T8215] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 459.546474][ T8215] __inet_stream_connect+0x83f/0xea0 [ 459.546489][ T8215] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 459.546502][ T8215] ? __inet_stream_connect+0x83f/0xea0 [ 459.546563][ T8215] ? inet_dgram_connect+0x2e0/0x2e0 [ 459.546580][ T8215] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 459.546593][ T8215] ? rcu_read_lock_sched_held+0x110/0x130 [ 459.546608][ T8215] ? kmem_cache_alloc_trace+0x354/0x760 [ 459.546621][ T8215] ? __lock_acquire+0x548/0x3fb0 [ 459.546643][ T8215] tcp_sendmsg_locked+0x231f/0x37f0 [ 459.546659][ T8215] ? mark_held_locks+0xf0/0xf0 [ 459.546677][ T8215] ? mark_held_locks+0xa4/0xf0 [ 459.546694][ T8215] ? tcp_sendpage+0x60/0x60 [ 459.546710][ T8215] ? lock_sock_nested+0x9a/0x120 [ 459.546738][ T8215] ? trace_hardirqs_on+0x67/0x230 [ 459.546753][ T8215] ? lock_sock_nested+0x9a/0x120 [ 459.546768][ T8215] ? __local_bh_enable_ip+0x15a/0x270 [ 459.546788][ T8215] tcp_sendmsg+0x30/0x50 [ 459.546802][ T8215] inet_sendmsg+0x147/0x5e0 [ 459.546815][ T8215] ? ipip_gro_receive+0x100/0x100 16:33:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000418e00000004fcff", 0x58}], 0x1) 16:33:55 executing program 5: mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x5411, &(0x7f0000000000)) [ 459.546838][ T8215] sock_sendmsg+0xdd/0x130 [ 459.558749][ T8215] __sys_sendto+0x262/0x380 [ 459.558770][ T8215] ? __ia32_sys_getpeername+0xb0/0xb0 [ 459.558803][ T8215] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.613607][ T8215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 459.613623][ T8215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 459.613637][ T8215] ? do_syscall_64+0x26/0x610 [ 459.613652][ T8215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.613672][ T8215] __x64_sys_sendto+0xe1/0x1a0 [ 459.613690][ T8215] do_syscall_64+0x103/0x610 [ 459.613706][ T8215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.613718][ T8215] RIP: 0033:0x4582b9 [ 459.613733][ T8215] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.613741][ T8215] RSP: 002b:00007f5cdca86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 459.613755][ T8215] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 459.613763][ T8215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 459.613780][ T8215] RBP: 000000000073bf00 R08: 0000000020000200 R09: 000000000000001c [ 459.656201][ T8215] R10: 0000000020040880 R11: 0000000000000246 R12: 00007f5cdca876d4 [ 459.656210][ T8215] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 459.703784][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.787627][ T8214] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8214 [ 459.843074][ T8214] caller is ip6_finish_output+0x335/0xdc0 [ 459.849091][ T8214] CPU: 0 PID: 8214 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 459.859057][ T8214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.870652][ T8214] Call Trace: [ 459.874922][ T8214] dump_stack+0x172/0x1f0 [ 459.880009][ T8214] __this_cpu_preempt_check+0x246/0x270 [ 459.886387][ T8214] ip6_finish_output+0x335/0xdc0 [ 459.891883][ T8214] ip6_output+0x235/0x7f0 [ 459.896610][ T8214] ? ip6_finish_output+0xdc0/0xdc0 [ 459.902152][ T8214] ? ip6_fragment+0x3980/0x3980 [ 459.907903][ T8214] ip6_xmit+0xe41/0x20c0 [ 459.907926][ T8214] ? ip6_finish_output2+0x2550/0x2550 [ 459.907940][ T8214] ? mark_held_locks+0xf0/0xf0 [ 459.907956][ T8214] ? ip6_setup_cork+0x1870/0x1870 [ 459.907971][ T8214] ? inet6_csk_route_socket+0x715/0xf40 [ 459.907996][ T8214] inet6_csk_xmit+0x2fb/0x5d0 [ 459.908010][ T8214] ? inet6_csk_update_pmtu+0x190/0x190 [ 459.908023][ T8214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.908045][ T8214] ? csum_ipv6_magic+0x20/0x80 [ 459.915387][ T8215] BUG: using __this_cpu_read() in preemptible [00000000] code: syz-executor.3/8215 [ 459.919380][ T8214] __tcp_transmit_skb+0x1a32/0x3750 [ 459.919406][ T8214] ? __tcp_select_window+0x8b0/0x8b0 [ 459.919430][ T8214] ? lockdep_hardirqs_on+0x418/0x5d0 [ 459.925120][ T8215] caller is ip6_finish_output+0x335/0xdc0 [ 459.930496][ T8214] ? trace_hardirqs_on+0x67/0x230 [ 459.998426][ T8214] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 460.004881][ T8214] tcp_write_xmit+0xe39/0x5660 [ 460.010090][ T8214] ? tcp_established_options+0x29d/0x4d0 [ 460.016361][ T8214] __tcp_push_pending_frames+0xb4/0x350 [ 460.022756][ T8214] tcp_send_fin+0x149/0xbb0 [ 460.027805][ T8214] tcp_close+0xddf/0x10c0 [ 460.032863][ T8214] ? ip_mc_drop_socket+0x211/0x270 [ 460.038020][ T8214] ? __sock_release+0x89/0x2b0 [ 460.043092][ T8214] inet_release+0x105/0x1f0 [ 460.048128][ T8214] inet6_release+0x53/0x80 [ 460.053444][ T8214] __sock_release+0xd3/0x2b0 [ 460.058419][ T8214] ? __sock_release+0x2b0/0x2b0 [ 460.064105][ T8214] sock_close+0x1b/0x30 [ 460.068802][ T8214] __fput+0x2e5/0x8d0 [ 460.073611][ T8214] ____fput+0x16/0x20 [ 460.077907][ T8214] task_work_run+0x14a/0x1c0 [ 460.082925][ T8214] exit_to_usermode_loop+0x273/0x2c0 [ 460.089036][ T8214] do_syscall_64+0x52d/0x610 [ 460.094772][ T8214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.101672][ T8214] RIP: 0033:0x412071 [ 460.106216][ T8214] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 460.129044][ T8214] RSP: 002b:00007ffd2cac5000 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 460.138016][ T8214] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000412071 [ 460.147688][ T8214] RDX: 0000000000000000 RSI: 00000000007404f0 RDI: 0000000000000004 [ 460.157134][ T8214] RBP: 0000000000000000 R08: 00000000007404e8 R09: 00000000000701ed [ 460.167045][ T8214] R10: 00007ffd2cac4f20 R11: 0000000000000293 R12: 0000000000000001 [ 460.177080][ T8214] R13: 00007ffd2cac5040 R14: 0000000000000000 R15: 00007ffd2cac5050 [ 460.186323][ T8215] CPU: 1 PID: 8215 Comm: syz-executor.3 Not tainted 5.1.0-rc3-next-20190405 #19 [ 460.197590][ T8215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.197597][ T8215] Call Trace: [ 460.197626][ T8215] dump_stack+0x172/0x1f0 [ 460.197647][ T8215] __this_cpu_preempt_check+0x246/0x270 [ 460.197665][ T8215] ip6_finish_output+0x335/0xdc0 [ 460.197684][ T8215] ip6_output+0x235/0x7f0 [ 460.197701][ T8215] ? ip6_finish_output+0xdc0/0xdc0 [ 460.197724][ T8215] ? ip6_fragment+0x3980/0x3980 [ 460.250362][ T8215] ip6_xmit+0xe41/0x20c0 [ 460.255067][ T8215] ? ip6_finish_output2+0x2550/0x2550 [ 460.262866][ T8215] ? mark_held_locks+0xf0/0xf0 [ 460.269144][ T8215] ? ip6_setup_cork+0x1870/0x1870 [ 460.275117][ T8215] inet6_csk_xmit+0x2fb/0x5d0 [ 460.280582][ T8215] ? inet6_csk_update_pmtu+0x190/0x190 [ 460.286624][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.293633][ T8215] ? csum_ipv6_magic+0x20/0x80 [ 460.299412][ T8215] __tcp_transmit_skb+0x1a32/0x3750 [ 460.305129][ T8215] ? __tcp_select_window+0x8b0/0x8b0 [ 460.311084][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.318912][ T8215] ? tcp_fastopen_no_cookie+0xe0/0x190 [ 460.324655][ T8215] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 460.331777][ T8215] tcp_connect+0x1e47/0x4280 [ 460.337468][ T8215] ? tcp_push_one+0x110/0x110 [ 460.343014][ T8215] ? secure_tcpv6_ts_off+0x24f/0x360 [ 460.349004][ T8215] ? secure_dccpv6_sequence_number+0x280/0x280 [ 460.356343][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.363243][ T8215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.370353][ T8215] ? prandom_u32_state+0x13/0x180 [ 460.376209][ T8215] tcp_v6_connect+0x150b/0x20a0 [ 460.381969][ T8215] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 460.387859][ T8215] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 460.394495][ T8215] ? __switch_to_asm+0x34/0x70 [ 460.399629][ T8215] ? __switch_to_asm+0x40/0x70 [ 460.404713][ T8215] ? find_held_lock+0x35/0x130 [ 460.409833][ T8215] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 460.417647][ T8215] __inet_stream_connect+0x83f/0xea0 [ 460.423887][ T8215] ? tcp_v6_conn_request+0x2b0/0x2b0 [ 460.429660][ T8215] ? __inet_stream_connect+0x83f/0xea0 [ 460.435445][ T8215] ? inet_dgram_connect+0x2e0/0x2e0 [ 460.440877][ T8215] ? tcp_sendmsg_locked+0x2170/0x37f0 [ 460.447336][ T8215] ? rcu_read_lock_sched_held+0x110/0x130 [ 460.453973][ T8215] ? kmem_cache_alloc_trace+0x354/0x760 [ 460.460270][ T8215] ? __lock_acquire+0x548/0x3fb0 [ 460.465676][ T8215] tcp_sendmsg_locked+0x231f/0x37f0 [ 460.472456][ T8215] ? mark_held_locks+0xf0/0xf0 [ 460.479366][ T8215] ? mark_held_locks+0xa4/0xf0 [ 460.486325][ T8215] ? tcp_sendpage+0x60/0x60 [ 460.493047][ T8215] ? lock_sock_nested+0x9a/0x120 [ 460.500282][ T8215] ? trace_hardirqs_on+0x67/0x230 [ 460.506481][ T8215] ? lock_sock_nested+0x9a/0x120 [ 460.512680][ T8215] ? __local_bh_enable_ip+0x15a/0x270 [ 460.521444][ T8215] tcp_sendmsg+0x30/0x50 [ 460.526653][ T8215] inet_sendmsg+0x147/0x5e0 [ 460.531778][ T8215] ? ipip_gro_receive+0x100/0x100 [ 460.537743][ T8215] sock_sendmsg+0xdd/0x130 [ 460.543661][ T8215] __sys_sendto+0x262/0x380 [ 460.550484][ T8215] ? __ia32_sys_getpeername+0xb0/0xb0 [ 460.557158][ T8215] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 460.564240][ T8215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 460.570709][ T8215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 460.577700][ T8215] ? do_syscall_64+0x26/0x610 [ 460.583397][ T8215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.591116][ T8215] __x64_sys_sendto+0xe1/0x1a0 [ 460.596608][ T8215] do_syscall_64+0x103/0x610 [ 460.601768][ T8215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 460.609485][ T8215] RIP: 0033:0x4582b9 [ 460.614252][ T8215] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 460.637259][ T8215] RSP: 002b:00007f5cdca86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 460.646469][ T8215] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004582b9 [ 460.655559][ T8215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 460.664808][ T8215] RBP: 000000000073bf00 R08: 0000000020000200 R09: 000000000000001c 16:33:56 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000004b5344", 0x15, 0x124}]) 16:33:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000418e00000004fcff", 0x58}], 0x1) [ 460.673925][ T8215] R10: 0000000020040880 R11: 0000000000000246 R12: 00007f5cdca876d4 [ 460.683567][ T8215] R13: 00000000004c59b6 R14: 00000000004d9d10 R15: 00000000ffffffff [ 460.753293][ T8242] loop5: [POWERTEC] p1 [ 460.797799][ T8242] loop5: p1 size 4293787650 extends beyond EOD, truncated 16:33:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000440)={r3}) 16:33:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r0, r1) 16:33:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x1b0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x1, 0xdd5, 0x0, 0xc1}, 0x98) 16:33:56 executing program 0: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) 16:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 16:33:56 executing program 1: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]}, 0x1c0) [ 460.990384][ T8242] loop5: [POWERTEC] p1 [ 461.005014][ T8242] loop5: p1 size 4293787650 extends beyond EOD, truncated [ 461.092443][ T8273] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 [ 461.121991][ T8278] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 16:33:56 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000004b5344", 0x15, 0x124}]) 16:33:56 executing program 1: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]}, 0x1c0) [ 461.224387][ T2491] print_req_error: I/O error, dev loop0, sector 0 flags 801 16:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 461.298756][ T8287] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 16:33:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000440)={r3}) 16:33:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x1b0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x1, 0xdd5, 0x0, 0xc1}, 0x98) 16:33:57 executing program 0: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) 16:33:57 executing program 1: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c200000000000000000000007000000070000000e80000006e666c6f670000000000000000000000000000000000000000000000000000050000000000000000000000400000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997213e0506220c21a44cc58ff5bc83d5e4066c7700000000"]}, 0x1c0) 16:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 461.527404][ T8302] loop5: [POWERTEC] p1 16:33:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x1b0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x1, 0xdd5, 0x0, 0xc1}, 0x98) [ 461.584734][ T8302] loop5: p1 size 4293787650 extends beyond EOD, truncated [ 461.605202][ T8304] irq bypass consumer (token 000000000bd85892) registration fails: -16 [ 461.623487][ T8313] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 16:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 16:33:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x1b0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x1, 0xdd5, 0x0, 0xc1}, 0x98) 16:33:57 executing program 1: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c200000000000000000000007000000070000000e80000006e666c6f670000000000000000000000000000000000000000000000000000050000000000000000000000400000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997213e0506220c21a44cc58ff5bc83d5e4066c7700000000"]}, 0x1c0) 16:33:57 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000004b5344", 0x15, 0x124}]) 16:33:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r3}) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000440)={r3}) [ 461.884350][ T8334] x_tables: eb_tables: nflog.0 target: invalid size 80 (kernel) != (user) 0 16:33:57 executing program 4: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) [ 461.981893][ T8341] loop5: [POWERTEC] p1 16:33:57 executing program 1: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) [ 462.016960][ T8341] loop5: p1 size 4293787650 extends beyond EOD, truncated 16:33:57 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:58 executing program 0: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) 16:33:58 executing program 4: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) 16:33:58 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff070000000000004b5344", 0x15, 0x124}]) 16:33:58 executing program 1: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) 16:33:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) 16:33:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) [ 462.673279][ T8381] loop5: [POWERTEC] p1 [ 462.716345][ T2490] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 462.725510][ T2490] Buffer I/O error on dev loop0, logical block 0, lost async page write 16:33:58 executing program 1: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) [ 462.760811][ T8381] loop5: p1 size 4293787650 extends beyond EOD, truncated [ 462.798821][ T2490] print_req_error: I/O error, dev loop0, sector 8 flags 801 16:33:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) 16:33:58 executing program 0: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) [ 462.808653][ T2490] Buffer I/O error on dev loop0, logical block 1, lost async page write 16:33:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, 0x0) 16:33:58 executing program 4: pipe(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000640)={r0, r1}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) bind$netrom(r1, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r4, &(0x7f0000000780)='security.SMICK64MMAP\x00\x90\b\xac\x18/\x9b*\xf8\xe3\\\x8f\xa9I\x1e\xb9\x01&Y&\xb1\x17A\x1b{mR7i6[\xc4\x9bz\xe4U#%><\xecK_.\xed\xac4\x8b\xfbN\x91\xb2\xa8\x00.\xa8U\xe53\xa8\x86\xb5\x00[*81\xcf,Xg{\x91\x04\xf7\x8a\xf5\xcb\xf5\b/l^\x9fm\xb7h\xea\x05[\xab\x839\x82\xe1>\r\xc8\xdb\x05\x9cw', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, 0x0, 0x20000102000007) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f00000005c0)=[{0x9, 0x9, 0x7afd, 0x9}, {0x4, 0x1, 0x3, 0x80000001}, {0xfffffffffffffff9, 0x0, 0x64}, {0x0, 0x0, 0x0, 0xe44}, {0x8, 0x7, 0x3, 0x3}, {0x0, 0x5, 0x0, 0x9}]}, 0x10) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) creat(0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="6b000000090000001b154c4a95cdf9f27a31bc500b84fbd1e5db7d54ebb860d78ed165af03f1a342aed04d1ef994ca96b5c9d03e6da9c1e249e007ea4ccdf094071a04f68fdf7f99ea03c5fbaa4f5c157462c4c817e3bb71556831aa6a12b6e867e33b6f70af6e23b7370d16601c719887b40de4a99bc0f70e3cf73545fe45fb9483e13859226754c24739fef7af52efb08a81b0e9df01d52bf1a98b815dd0bd16460503345e492b90165febf62b7140c1faf85425c6856237c130f5511d1ad6cc1a83fe496605cdc68b511d3cddf9f89852b099e4cb7fb7dc106e9627fee565406aeb814cba45ce8c3e548242ff00"/248], 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003fc0), &(0x7f0000004000)=0x14, 0x0) 16:33:58 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:58 executing program 3: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) [ 463.284381][ T2491] print_req_error: I/O error, dev loop0, sector 0 flags 801 16:33:58 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffd9cf3d34740600d4ff5bffff00e7e5f37d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 16:33:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffd9cf3d34740600d4ff5bffff00e7e5f37d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 16:33:59 executing program 2: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:59 executing program 3: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:59 executing program 1: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:59 executing program 5: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:59 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(0x0, 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', 0x0) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) geteuid() stat(&(0x7f0000000940)='./file0/../file0\x00', &(0x7f0000000980)) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 16:33:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffd9cf3d34740600d4ff5bffff00e7e5f37d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 16:33:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffd9cf3d34740600d4ff5bffff00e7e5f37d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1)