Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2019/03/19 06:48:36 fuzzer started 2019/03/19 06:48:41 dialing manager at 10.128.0.26:39805 2019/03/19 06:48:42 syscalls: 1 2019/03/19 06:48:42 code coverage: enabled 2019/03/19 06:48:42 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/19 06:48:42 extra coverage: extra coverage is not supported by the kernel 2019/03/19 06:48:42 setuid sandbox: enabled 2019/03/19 06:48:42 namespace sandbox: enabled 2019/03/19 06:48:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/19 06:48:42 fault injection: enabled 2019/03/19 06:48:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/19 06:48:42 net packet injection: enabled 2019/03/19 06:48:42 net device setup: enabled 06:51:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r0, 0x1156}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)={0x6}, 0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000003c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x80000001, @loopback, 0x100000001}}, [0x3, 0x81, 0x3f, 0x20, 0x800, 0x7f, 0x0, 0x6, 0x6b66, 0x9, 0xffffffff80000000, 0xff, 0xbdb, 0x80, 0x8]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r4}, &(0x7f00000003c0)=0x8) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040)) syzkaller login: [ 307.479857] IPVS: ftp: loaded support on port[0] = 21 [ 307.636796] chnl_net:caif_netlink_parms(): no params data found [ 307.710108] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.716852] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.725484] device bridge_slave_0 entered promiscuous mode [ 307.735531] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.742145] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.750813] device bridge_slave_1 entered promiscuous mode [ 307.786578] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 307.798373] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 307.832540] team0: Port device team_slave_0 added [ 307.841511] team0: Port device team_slave_1 added [ 308.116847] device hsr_slave_0 entered promiscuous mode [ 308.162839] device hsr_slave_1 entered promiscuous mode [ 308.443106] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.449677] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.456976] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.463608] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.545986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.567075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.578355] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.587652] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.598499] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 308.619159] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.636024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.645131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.653354] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.659849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.712520] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 308.722492] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 308.738391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.747179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.755786] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.762348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.771364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 308.780629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 308.789773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 308.798684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.807318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 308.816140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.825053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 308.833332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.842042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 308.850256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.866546] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 308.875730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 308.904070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.186643] hrtimer: interrupt took 31531 ns 06:51:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r0, 0x1156}], 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)={0x6}, 0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001740)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000003c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x80000001, @loopback, 0x100000001}}, [0x3, 0x81, 0x3f, 0x20, 0x800, 0x7f, 0x0, 0x6, 0x6b66, 0x9, 0xffffffff80000000, 0xff, 0xbdb, 0x80, 0x8]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r4}, &(0x7f00000003c0)=0x8) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040)) 06:51:55 executing program 0: ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f00000000c0)={0x1}) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)={0x0, 0x4}) 06:51:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000080), 0x4) sendmmsg(r0, &(0x7f0000004500)=[{{0x0, 0xffffff7f, 0x0}}], 0x1fe, 0x0) listen(0xffffffffffffffff, 0x7) 06:51:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x41, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x1, 0x0, "c6dc30e048bef86208773abb3b1252a5bfe9bd2f8d3a7e18c7396eee06a10287a59a7d9c5651910649651357790fac7dfa108496eb4937eaaacc8c0bfab896c2c6170878cf8618a5a26d278099733b87"}, 0x466) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) ioctl$int_in(r1, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000000), 0x10000) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x8002) syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc1105518, &(0x7f0000001000)) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000240)={'veth1_to_bridge\x00', {0x2, 0x4e22, @remote}}) read(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)) write(r4, &(0x7f0000000340), 0xfffffffffffffff7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) dup(r3) eventfd(0x0) unshare(0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x12, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000001c6c000000000000000000129c0000000000950000000000000021f5472c34895f2a3f40b710bdbde8001116a3294f1e4dfd6944fad212d9576a172d1f9dcbb0e58fed1703835639df0d6c2427f2400c38699a4a1b7d3b6f76917bd8d2697fc2edcc1290aa4606c8bdc942035fc1a200e7bb64c94a7364d358a992fbb8658ba52702b99a0b000000000000"], 0x0, 0x1}, 0x48) 06:51:57 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x50009405, &(0x7f0000001180)={{}, 0x0, 0x0, 'id0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00y\x8a\x00', 'timer1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) 06:51:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x41, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x1, 0x0, "c6dc30e048bef86208773abb3b1252a5bfe9bd2f8d3a7e18c7396eee06a10287a59a7d9c5651910649651357790fac7dfa108496eb4937eaaacc8c0bfab896c2c6170878cf8618a5a26d278099733b87"}, 0x466) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) ioctl$int_in(r1, 0x5421, &(0x7f0000000380)=0x801) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000000), 0x10000) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x8002) syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0xc1105518, &(0x7f0000001000)) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000240)={'veth1_to_bridge\x00', {0x2, 0x4e22, @remote}}) read(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)) write(r4, &(0x7f0000000340), 0xfffffffffffffff7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, 0x0) dup(r3) eventfd(0x0) unshare(0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x12, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000001c6c000000000000000000129c0000000000950000000000000021f5472c34895f2a3f40b710bdbde8001116a3294f1e4dfd6944fad212d9576a172d1f9dcbb0e58fed1703835639df0d6c2427f2400c38699a4a1b7d3b6f76917bd8d2697fc2edcc1290aa4606c8bdc942035fc1a200e7bb64c94a7364d358a992fbb8658ba52702b99a0b000000000000"], 0x0, 0x1}, 0x48) [ 311.789362] IPVS: ftp: loaded support on port[0] = 21 06:51:58 executing program 0: r0 = syz_open_dev$vcsa(0x0, 0x400, 0x400) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x8000, 0x4) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000640)={'nr0\x01\x00', 0x4002}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x200000007) close(0xffffffffffffffff) 06:51:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000300)={0x6}) 06:51:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000140)={0x38000004, 0x0, "ac07e9ac902200000000000000000000f5ff0000000000000000b93b00"}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 06:51:59 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8918, &(0x7f00000000c0)="a96bef04000000000000005e39e299b9e318edfb164c5c5ede4631df3044d04c00000000000000e6eb76429b5f12d5019afff9fef7") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x2081, 0x23) 06:51:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r1, &(0x7f00000043c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="18004a750000000300000004000000bd489ee09ff7c4500ab3a0c8de954b082f24da23a1b1a112663b69ac22693edd0959a670a54c03359d2ab4f70000000000002eb6c9aadfbf7ad9fdaeec001270c95517ac10a19f4fd8b558f0ec334a8b7e20ce11d2606834551ab1e44a229efd49205ea32abe9d1ceff90a4d97248f3a1b424217f3e0cb627ed722593e26d62b5d5c2c246c741acebb499e231f112eaa7543b4eed574e96a15157d8844d30ca9000000000000000000000000000000"], 0x18}}, 0x0) 06:52:00 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2500, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x2000000000000, @remote, 0x80}, 0x1c) iopl(0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x70, &(0x7f00000bfff0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3b4}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0x2, 0x1}, 0x20) 06:52:00 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00000001c0)=""/105, &(0x7f0000000080)=0x69) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) futex(&(0x7f0000000180)=0x1, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000002c0)=""/251, 0xfffffffffffffe8b, 0x20000101, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x8e) 06:52:00 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0xd54, 0x4, 0x80, &(0x7f0000ffd000/0x3000)=nil, 0x1c0000000000000}) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000140)={0xe5, 0x1, 0x6, 0xfffffffffffffffa, "f955351ef409714aa256eb88bca02d3e2b58d3741d2d9cd7334cce6f7bd53511"}) 06:52:00 executing program 0: r0 = getpgid(0xffffffffffffffff) sched_getaffinity(r0, 0x8, &(0x7f0000000080)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40401, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) r2 = syz_open_procfs(r0, &(0x7f0000000040)='clear_refs\x00') lseek(r2, 0x0, 0x0) 06:52:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000380)={0x6, 0x0, [0x79, 0x0, 0x8]}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x4000, 0x0) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000000)={0x2, 0x402, &(0x7f0000000280)="f5ee033cbe917988f6f3cbd96680601db089cbf77ccc170318a26ae49f4a98611d65095cafe4f9c7b9e6f797d244e994995c3d7108857666e64d902b0d5da45145cb4f607ce0e5721c46be87f412006eed88e24f93a2142921442e5fde86f8511595ef47bdb999f9a694e8c53cb44c2faf571f3bec9f4117bb2b000000000000000000ff00000000000097179b2a0771c04172ef342f81e77d710dfc6e484bc367be559f71dc4576a80e377d36f9a246afda4ad1e41e07c7da1e5ccebfa463b3d60000000000", {0x1, 0xffffffffffff3236, 0x75734772, 0x5, 0x7f, 0x5, 0xf, 0x7ff}}) [ 314.593444] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 06:52:00 executing program 1: r0 = socket$inet6(0xa, 0x80006, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x0, @empty}], 0x1c) 06:52:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) clock_settime(0x7, &(0x7f0000000000)={0x0, 0x1c9c380}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r1}, 0x8) 06:52:00 executing program 1: r0 = memfd_create(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x4) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x51, r0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x402000) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000140)=0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) r3 = gettid() kcmp(r2, r3, 0x4, r1, r0) mbind(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1, &(0x7f00000000c0), 0x9, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4002, &(0x7f0000000040)=0xf2, 0x3f, 0x0) mbind(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x2, 0x0) 06:52:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1f, 0x4a0000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffffef}, 0x10) clock_gettime(0x0, &(0x7f0000000080)={0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={r2}, 0x10) sendto$inet6(r0, &(0x7f0000000040)="cd", 0x1, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x28002, 0x0) 06:52:01 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) 06:52:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffffb, [], &(0x7f0000000040)=0x2}) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000080)=0x11f) 06:52:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x2, &(0x7f0000000000)=""/32, 0x20) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000140), 0x4) close(r2) close(r1) 06:52:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x400800, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) unshare(0x8010000) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)='K', 0x1}], 0x1, 0x0) r2 = msgget$private(0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x0}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={0x0, 0x83, 0x4}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @empty}}, 0x7fffffff, 0x6, 0x7b449855, 0x5, 0x4}, &(0x7f00000004c0)=0x98) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000340)={r3, 0x6d3d391ff9feb12a}) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000180)=""/183) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000240)=""/11) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x313400, 0x0) ioctl$PPPIOCGDEBUG(r5, 0x80047441, &(0x7f0000000080)) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) 06:52:01 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f00000002c0)={0x2, 0xffffffffffffffff, @loopback}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x80) r2 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000180)={{0x5, 0x7, 0x3, 0x88, '\x00', 0xb9}, 0x4, 0x100, 0x9, r2, 0x2, 0x0, 'syz1\x00', &(0x7f0000000140)=['\x00', '\x00'], 0x2, [], [0x3, 0x1000, 0x9, 0x7c18]}) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000001240)=[@mask_cswp={0x58, 0x114, 0x9, {{}, &(0x7f00000011c0), &(0x7f0000001200)}}, @mask_fadd={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f00000000c0)}}], 0xb0}, 0x0) 06:52:01 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x29, 0x7, "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", 0xff, 0x0, 0x7fffffff, 0xf7, 0x1000, 0x5, 0x40}, r1}}, 0x120) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20aac0, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x9, &(0x7f0000000100)=0x2) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x10010009, 0xffffffffffffffff}) 06:52:02 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000000c0)) pread64(r0, &(0x7f0000000000)=""/119, 0x77, 0x0) 06:52:02 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4000000000000005, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') sendfile(r0, r1, 0x0, 0xff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) 06:52:02 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) 06:52:02 executing program 2: ioctl$VIDIOC_DQBUF(0xffffffffffffff9c, 0xc0585611, &(0x7f0000000000)={0x6, 0xf, 0x4, 0x1000, {0x0, 0x7530}, {0x5, 0x0, 0x2e, 0x2, 0x3f, 0x7fff, "d31f616a"}, 0x6, 0x0, @fd=0xffffffffffffffff, 0x4}) ppoll(&(0x7f0000000080)=[{r0, 0xa040}], 0x1, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={0x81}, 0x8) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xfffffffffffffffd, 0x101000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x4, @loopback, 0x9}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={r2, 0x7}, 0x8) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) recvmsg(r1, &(0x7f00000018c0)={&(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001780)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/211, 0xd3}, {&(0x7f00000014c0)=""/204, 0xcc}, {&(0x7f00000015c0)=""/250, 0xfa}, {&(0x7f00000016c0)=""/104, 0x68}, {&(0x7f0000001740)=""/51, 0x33}], 0x6, &(0x7f0000001800)=""/145, 0x91}, 0x2) ioctl$RTC_AIE_OFF(r1, 0x7002) r3 = syz_open_dev$usbmon(&(0x7f0000001900)='/dev/usbmon#\x00', 0x6d, 0x1) poll(&(0x7f0000001940)=[{r1, 0x10}, {r3, 0x8028}], 0x2, 0x100000000) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000001980)={0x100000000, 0x1, 0x1, 0x5, 0x5, 0x2, 0xfffffffffffffff7}) getsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f00000019c0)={@multicast2, @loopback, @initdev}, &(0x7f0000001a00)=0xc) getsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000001a40), &(0x7f0000001a80)=0x4) timerfd_gettime(r1, &(0x7f0000001ac0)) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/hwrng\x00', 0x80, 0x0) lsetxattr$security_evm(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='security.evm\x00', &(0x7f0000001bc0)=@md5={0x1, "9e1165d2c96f96784ff14714728bc128"}, 0x11, 0x2) r5 = inotify_add_watch(r3, &(0x7f0000001c00)='./file0\x00', 0x80) inotify_rm_watch(r3, r5) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$VIDIOC_G_SELECTION(r4, 0xc040565e, &(0x7f0000001c40)={0x3, 0x103, 0x1, {0xffffffff7fffffff, 0xe9, 0x1, 0xc626d0a}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001dc0)={r1, &(0x7f0000001c80)="510743abc8f8e3c9ad73df09788e8dec0ec02bafa77cac2772c51d1cff2e046dc5e4bb55ce7e483818c10dea5920e5179df48c9b44bb4b8c2ca26aca831ff231403117e4453b15b6c8b8f3ba79a2a6d1240b00ea8ec3ee771fe9185e3edbc0", &(0x7f0000001d00)="a61c7797d29b0f7067f5e661602cb6d9d5d0e14ac277c4229c38b8285de050947f2d69b7168b88dc4e9cbcf940b20eeacae144db5aeb1e369595bc8e6099f0b397d45c15aae7423131ae8a6afde4d381d16f9fb0c91616087ee8a35b8f9b662dc6132d23039f3a6236cf4b134e7220fa0a79d69d7aa239beef8f840c91fac6b1b61c60b74d10798aacd724", 0x2}, 0x20) msgget(0x0, 0x2a8) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001e00)={0x15, 0x7ae, 0x1, 0x7, 0x1b, 0x0, 0x5, 0x8001, 0x7, 0x7}) openat$vsock(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000001e80), &(0x7f0000001ec0)=0x40) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001f00)) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000001f40)=""/59) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/cachefiles\x00', 0x404100, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000001fc0)={r2, 0x6, 0x3b, "e97b8e451b096675197c8b7edb7c32d3708bf074ff70cd173b234b7a96a1c350628938c16b7ef5f69ee0d12c32ea41c9972bc12b3edf3f908e9b70"}, 0x43) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000002040)={r2, 0xffffffffffffff81, 0x1, 0x6, 0x2}, 0x14) 06:52:02 executing program 1: set_mempolicy(0x2, &(0x7f00000000c0)=0x1, 0x2) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x29, 0x7, "64ec808109c2bdc1152c980317939fc7f92fb25e050e359b66fc90cb13bda65346ec6f5d39a1f2807777225cbe5ad03a9a66d9598d7c5e26bd0107198b0ef5ef41c454e344c8dc1ab83493d192f891437e2269e7134f712340f34cb09bef2dd76072d304e8230b10c8e29d25439a63ea4fd02b8653ad2279747b48b309fb4a1583230a65bc5de62959da3bcf983d42a01f5c918b32bc149065a548ac4cf5fba3be7a4797db20f8bed110a509369566c38d68c50fe2cbe0c7adbb06da64c5f5bbc0eafae65bd36c22c038beef36ba4b4bc4440c11928f70a8f53baca6b1b8fd81698764aaa4a257e98cbeae81ec04f1cf55f7e09b3b41b911280bf7ed7ffb7c39", 0xff, 0x0, 0x7fffffff, 0xf7, 0x1000, 0x5, 0x40}, r1}}, 0x120) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20aac0, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x9, &(0x7f0000000100)=0x2) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x10010009, 0xffffffffffffffff}) 06:52:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0xfeac) setsockopt$sock_int(r0, 0x1, 0x83d, &(0x7f0000d4effc)=0x401, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000280)={0x8, 0x7, 0x7}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) write$P9_RWRITE(r1, 0xfffffffffffffffd, 0x84338920) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f0000000140)={{0x0, 0x1, 0xe, 0x9, 0xff, 0x1, 0x4, 0x1ff, 0x1, 0x5, 0x80, 0x2}, {0xf000, 0x101000, 0xd, 0x1ff, 0x8, 0x4910, 0xffffffff, 0xffffffffffffffff, 0x800, 0x1, 0x0, 0x9}, {0x100000, 0x5000, 0x1d, 0x5, 0x81, 0x5, 0x7f, 0x256, 0x3f, 0x6830, 0x4, 0x727}, {0x0, 0x103000, 0xf, 0x5, 0x1, 0x0, 0x4, 0x80000000, 0xff, 0x8, 0x1, 0x1}, {0xf000, 0x3000, 0xe, 0x2, 0x4c5e, 0xf596, 0x10001, 0x3ff, 0x8, 0xb48e, 0x200, 0x9}, {0x3000, 0x2000, 0xe, 0x0, 0x9, 0x8000, 0x6, 0xd90, 0x20, 0x8001, 0x0, 0x3f}, {0x10000, 0x6000, 0x10, 0x249174de, 0x7, 0x6, 0x4, 0x0, 0x8001, 0x80000001, 0x7, 0x6}, {0x6000, 0x5000, 0xb, 0x8001, 0xfffffffffffffff9, 0x1c9d5c70, 0x3, 0x5, 0x8, 0x1f, 0x42, 0x8d97}, {0xd000, 0x105005}, {0x5000, 0x4001}, 0x40000, 0x0, 0x4000, 0x200, 0xa, 0x8100, 0x110000, [0xcdc3, 0xfffffffffffffff7, 0x1, 0x5]}) sendto$inet(r0, &(0x7f0000000140), 0xfffffffffffffdbb, 0x20804047ffa, 0x0, 0xfffffd2f) [ 317.092308] ------------[ cut here ]------------ [ 317.097117] kernel BUG at mm/kmsan/kmsan.c:693! [ 317.101905] invalid opcode: 0000 [#1] SMP [ 317.106076] CPU: 1 PID: 11003 Comm: syz-executor.0 Not tainted 5.0.0+ #15 [ 317.113021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.122446] RIP: 0010:kmsan_internal_check_memory+0xb45/0xb80 [ 317.128363] Code: 65 8b 34 25 04 90 03 00 65 48 8b 14 25 90 0d 04 00 48 c7 c7 4c 6c 81 8b 31 c0 e8 f6 fe 79 ff 0f 0b 0f 0b e8 cd 23 56 ff 0f 0b <0f> 0b e8 b4 d1 79 ff 85 c0 75 1f 65 8b 34 25 04 90 03 00 65 48 8b [ 317.147293] RSP: 0018:ffff8880595dfac8 EFLAGS: 00010046 [ 317.152678] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 317.159968] RDX: 0000000000000000 RSI: 000007ffffffffff RDI: ffff8880595efc48 [ 317.167273] RBP: ffff8880595dfb78 R08: 000000000000611b R09: ffff88812fd39010 [ 317.174565] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000cb6000ae [ 317.181859] R13: 0000000000000000 R14: 0000000000000202 R15: 0000000000000008 [ 317.189160] FS: 0000000002865940(0000) GS:ffff88812fd00000(0000) knlGS:0000000000000000 [ 317.197414] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.203403] CR2: 000000000286e978 CR3: 000000005959c000 CR4: 00000000001406e0 [ 317.210693] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.217988] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 317.225284] Call Trace: [ 317.227965] ? ptep_set_access_flags+0x112/0x1c0 [ 317.232782] kmsan_check_memory+0xd/0x10 [ 317.236877] filldir+0x48f/0xaf0 [ 317.240303] ? fillonedir+0x810/0x810 [ 317.244132] dcache_readdir+0x315/0xc60 [ 317.248166] ? move_cursor+0x880/0x880 [ 317.252073] iterate_dir+0x3dc/0x880 [ 317.255833] __se_sys_getdents+0x27d/0x5c0 [ 317.260102] ? fillonedir+0x810/0x810 [ 317.263938] __x64_sys_getdents+0x4a/0x70 [ 317.268116] do_syscall_64+0xbc/0xf0 [ 317.271916] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.277144] RIP: 0033:0x45647b [ 317.280353] Code: 02 74 b6 31 f6 eb b9 0f 1f 84 00 00 00 00 00 41 57 41 56 48 63 ff 41 55 41 54 b8 4e 00 00 00 55 53 48 89 f3 48 83 ec 08 0f 05 <48> 3d 00 f0 ff ff 77 55 4c 8d 24 06 49 89 c5 4c 39 e6 73 33 90 0f [ 317.299280] RSP: 002b:0000000000a4ec20 EFLAGS: 00000202 ORIG_RAX: 000000000000004e [ 317.307020] RAX: ffffffffffffffda RBX: 0000000002866970 RCX: 000000000045647b [ 317.314314] RDX: 0000000000008000 RSI: 0000000002866970 RDI: 0000000000000003 [ 317.321605] RBP: 0000000002866970 R08: 0000000000000001 R09: 0000000002865940 [ 317.328921] R10: 0000000000000000 R11: 0000000000000202 R12: ffffffffffffffd4 [ 317.336210] R13: 0000000000000016 R14: 0000000000000000 R15: 0000000000a4fdc0 [ 317.343530] Modules linked in: [ 317.346777] ---[ end trace 5e7687c0dac7f85d ]--- [ 317.351557] RIP: 0010:kmsan_internal_check_memory+0xb45/0xb80 [ 317.357482] Code: 65 8b 34 25 04 90 03 00 65 48 8b 14 25 90 0d 04 00 48 c7 c7 4c 6c 81 8b 31 c0 e8 f6 fe 79 ff 0f 0b 0f 0b e8 cd 23 56 ff 0f 0b <0f> 0b e8 b4 d1 79 ff 85 c0 75 1f 65 8b 34 25 04 90 03 00 65 48 8b [ 317.376408] RSP: 0018:ffff8880595dfac8 EFLAGS: 00010046 [ 317.381788] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 317.389081] RDX: 0000000000000000 RSI: 000007ffffffffff RDI: ffff8880595efc48 [ 317.396373] RBP: ffff8880595dfb78 R08: 000000000000611b R09: ffff88812fd39010 [ 317.403666] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000cb6000ae [ 317.410952] R13: 0000000000000000 R14: 0000000000000202 R15: 0000000000000008 [ 317.418256] FS: 0000000002865940(0000) GS:ffff88812fd00000(0000) knlGS:0000000000000000 [ 317.426503] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.432405] CR2: 000000000286e978 CR3: 000000005959c000 CR4: 00000000001406e0 [ 317.439699] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.446985] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 317.454284] Kernel panic - not syncing: Fatal exception [ 317.460653] Kernel Offset: disabled [ 317.464314] Rebooting in 86400 seconds..