[info] Using makefile-style concurrent boot in runlevel 2. [ 26.640062] audit: type=1800 audit(1544110311.860:21): pid=5820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2018/12/06 15:32:00 fuzzer started 2018/12/06 15:32:02 dialing manager at 10.128.0.26:38563 syzkaller login: [ 37.304454] collect2 (5980) used greatest stack depth: 15328 bytes left 2018/12/06 15:32:02 syscalls: 1 2018/12/06 15:32:02 code coverage: enabled 2018/12/06 15:32:02 comparison tracing: enabled 2018/12/06 15:32:02 setuid sandbox: enabled 2018/12/06 15:32:02 namespace sandbox: enabled 2018/12/06 15:32:02 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/06 15:32:02 fault injection: enabled 2018/12/06 15:32:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/06 15:32:02 net packet injection: enabled 2018/12/06 15:32:02 net device setup: enabled 15:35:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x1d9) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) [ 216.088860] IPVS: ftp: loaded support on port[0] = 21 15:35:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 216.350060] IPVS: ftp: loaded support on port[0] = 21 15:35:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, &(0x7f0000000140)=[@dstype3], 0x3c5) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 216.607255] IPVS: ftp: loaded support on port[0] = 21 15:35:02 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = memfd_create(&(0x7f0000000340)='vboxnet0@wlan0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x200000000, 'queue1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x40002, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x8, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x20, 0x82, 0x4, 0x6, 0xeba, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x9000000000000000, 0x1, @perf_config_ext={0x1000, 0xd7}, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x2}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) [ 217.126352] IPVS: ftp: loaded support on port[0] = 21 15:35:02 executing program 4: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000"]}, 0x108) [ 217.668155] IPVS: ftp: loaded support on port[0] = 21 [ 217.816089] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.823302] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.831825] device bridge_slave_0 entered promiscuous mode [ 217.970021] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.976494] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.985889] device bridge_slave_1 entered promiscuous mode [ 218.092988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 15:35:03 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000122, 0x0) [ 218.250101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.409436] IPVS: ftp: loaded support on port[0] = 21 [ 218.465356] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.473142] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.480958] device bridge_slave_0 entered promiscuous mode [ 218.498528] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.508324] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.516199] device bridge_slave_0 entered promiscuous mode [ 218.617236] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.653873] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.665467] device bridge_slave_1 entered promiscuous mode [ 218.677548] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.685836] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.700403] device bridge_slave_1 entered promiscuous mode [ 218.770679] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.820121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.829557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.913907] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.929995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.979050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.159787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 219.166672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.370626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.404447] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.424674] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.437266] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.460234] device bridge_slave_0 entered promiscuous mode [ 219.506339] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.565854] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.591638] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.598362] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.611416] device bridge_slave_1 entered promiscuous mode [ 219.628317] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.644498] team0: Port device team_slave_0 added [ 219.653819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.670906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.712855] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.735727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.779062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.801754] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.817375] team0: Port device team_slave_1 added [ 219.888257] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.918043] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.929476] device bridge_slave_0 entered promiscuous mode [ 220.008425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.021859] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.028306] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.038656] device bridge_slave_1 entered promiscuous mode [ 220.100697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.159937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.206398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.219476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.238895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.284697] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.293426] team0: Port device team_slave_0 added [ 220.302324] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.309767] team0: Port device team_slave_0 added [ 220.351969] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.369066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.379310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.403473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.420079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.427426] team0: Port device team_slave_1 added [ 220.448147] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.463290] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.490259] team0: Port device team_slave_1 added [ 220.498338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.526055] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.535362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.570615] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.580317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.590046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.609581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.645557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.666928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.689878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.708004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.737311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.747558] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.766889] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.773799] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.788347] device bridge_slave_0 entered promiscuous mode [ 220.802265] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.811796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.819807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.827678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.865166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.883578] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.904665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.915902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.942536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.953334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.979389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.992390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.009396] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.015755] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.024553] device bridge_slave_1 entered promiscuous mode [ 221.036905] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.064545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.080743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.102770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.123848] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.142294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.153375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.182445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.216929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.229443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.262929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.374367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.392962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.485007] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.499860] team0: Port device team_slave_0 added [ 221.608502] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.627150] team0: Port device team_slave_1 added [ 221.702440] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.739717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.830527] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.838437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.847555] team0: Port device team_slave_0 added [ 221.859373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.001439] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.020593] team0: Port device team_slave_1 added [ 222.027153] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.044971] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.051524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.058494] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.064903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.085586] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.118280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.139602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.180392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.200050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.241829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.272097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.280458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.293327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.321641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.339652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.429831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.439901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.449918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.472941] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.486858] team0: Port device team_slave_0 added [ 222.509461] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.523672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.570320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.640535] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.646915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.653622] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.660042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.688172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.698533] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.704953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.711640] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.718014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.743456] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.750544] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.757884] team0: Port device team_slave_1 added [ 222.869282] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.876556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.886129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.998111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.077839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.100422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.116507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.193568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.210277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.242825] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.250963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.267913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.786295] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.792735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.799452] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.805821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.846443] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 223.971480] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.977883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.985386] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.991813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.006850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.215468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.222992] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.643325] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.649771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.656442] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.662873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.691624] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.219323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.592877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.034687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.048827] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.067485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.487871] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.514511] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.529184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.547534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.581926] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.604121] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.869184] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.966973] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.006622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.034129] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.047836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.079490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.093025] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.130622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.137752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.446084] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.455189] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.469162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.478058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.550644] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.667283] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.904229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.930643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.945071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.963878] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.983319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.408326] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.431999] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.869997] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.876185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.886839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.273170] 8021q: adding VLAN 0 to HW filter on device team0 15:35:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) 15:35:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, &(0x7f00000000c0)={0xd00}) 15:35:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2286, &(0x7f00000000c0)={0xd00}) 15:35:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x227d, &(0x7f00000000c0)={0xd00}) [ 232.420029] hrtimer: interrupt took 31962 ns 15:35:17 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) [ 232.591644] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 232.612740] kauditd_printk_skb: 9 callbacks suppressed [ 232.612753] audit: type=1800 audit(1544110517.830:31): pid=7504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16527 res=0 [ 232.707878] audit: type=1800 audit(1544110517.870:32): pid=7504 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16527 res=0 15:35:18 executing program 1: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='vboxnet0@wlan0\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x200000000, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 15:35:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') dup3(r0, r1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 15:35:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)={@void, @val={0x0, 0x84, 0x0, 0x3f}, @ipv6={0x0, 0x6, "7a90e2", 0x10, 0x0, 0x0, @empty, @ipv4, {[], @icmpv6=@ni}}}, 0x42) 15:35:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r0) 15:35:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 233.072940] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.100508] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 233.166629] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:35:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000240)={0x3}) [ 233.636699] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the (last) chain [ 233.670527] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the (last) chain 15:35:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 15:35:19 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="1f0000000104ff00fd4354c007110000f305014008000100010023dcffdf0043fd08fde6b1e129", 0x27) dup3(r1, 0xffffffffffffffff, 0x0) 15:35:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001000)=""/4096, &(0x7f00000002c0)=0x1000) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[0x0]) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000980)) setfsuid(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000480), 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x10001, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000580)=""/252) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000040000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x40000000, 0x0, 0x6]}, 0x2000000}) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000200)={0x0, 0x3ff}) shutdown(0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) close(r4) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@remote, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x3}) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f00000003c0)=""/14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)=ANY=[], 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getpgrp(0x0) socket$inet6(0xa, 0x807, 0x40) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f0000000080)={0x6, 0x1, 0x400, 0x4}) r6 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x9}, &(0x7f0000000300)=0x8) ioctl$sock_SIOCETHTOOL(r6, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="330007000000ecff672bcaf2deffb6ff0f67535fff7261040000000c3e6600fc440b514ceaf2c207f09082cc2f424801e2b600000000ca13622e422b6690d4950781fa6592850841950e316260c800000000aa0544cc41eaf14034d2"]}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 15:35:19 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200080003, 0x1) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f0000000140)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000000)=0x7, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b00)=""/67, 0x43}], 0x1, &(0x7f0000001c80)=""/27, 0x1b}, 0xa48}, {{&(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002140)}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002580)=""/3, 0x3}], 0x1, &(0x7f0000002740)=""/243, 0xf3}}], 0x3, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000000340)=""/207, &(0x7f0000000440)=0xcf) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f00000006c0)={0x0}}, 0x4810) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000000c0)={0x4, 0xf003, 0xffffffffffffe660, 0xd3d8, 0x9}) accept(r2, &(0x7f0000000780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000800)=0x80) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000001200)=""/228) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000740)={0x7, 0x1b, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)="736d617073005196570b53d43b8812929048eda3747551affb") getuid() connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) preadv(r4, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 15:35:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') exit(0x0) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x0) 15:35:19 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x8, 0x0, 0x47}) 15:35:19 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000280)={0x0, 0xc, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b52dd389"}, 0x0, 0x0, @fd, 0x4}) [ 234.047394] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 234.072742] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 15:35:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)={@void, @val={0x0, 0x84}, @ipv6={0x0, 0x6, "7a90e2", 0x10, 0x0, 0x0, @empty, @ipv4, {[], @icmpv6=@ni}}}, 0x42) 15:35:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={"69705f7674693000000100", 0x201e}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@ipv4={[], [], @multicast2}, 0x0, r4}) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto(r5, 0x0, 0x0, 0x0, &(0x7f0000000200)=@generic={0xa, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) [ 234.305541] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.312633] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.408439] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:35:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001000)=""/4096, &(0x7f00000002c0)=0x1000) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[0x0]) getpeername$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000980)) setfsuid(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000480), 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x10001, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000580)=""/252) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000040000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x40000000, 0x0, 0x6]}, 0x2000000}) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000200)={0x0, 0x3ff}) shutdown(0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) close(r4) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@remote, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x3}) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f00000003c0)=""/14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)=ANY=[], 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) getpgrp(0x0) socket$inet6(0xa, 0x807, 0x40) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f0000000080)={0x6, 0x1, 0x400, 0x4}) r6 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x9}, &(0x7f0000000300)=0x8) ioctl$sock_SIOCETHTOOL(r6, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="330007000000ecff672bcaf2deffb6ff0f67535fff7261040000000c3e6600fc440b514ceaf2c207f09082cc2f424801e2b600000000ca13622e422b6690d4950781fa6592850841950e316260c800000000aa0544cc41eaf14034d2"]}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 15:35:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732f5398416f16}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x7) 15:35:19 executing program 4: clone(0x13102401ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x36}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 15:35:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xe78f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x11, r3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setsig(0x4203, r2, 0x0, &(0x7f0000000300)) 15:35:20 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x2b}, 0x0, @in6=@loopback, 0x0, 0x3, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, @mcast1}, 0x1c) 15:35:20 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20012, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) 15:35:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) 15:35:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 15:35:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200080003, 0x1) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f0000000140)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000000)=0x7, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b00)=""/67, 0x43}], 0x1, &(0x7f0000001c80)=""/27, 0x1b}, 0xa48}, {{&(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002140)}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002580)=""/3, 0x3}], 0x1, &(0x7f0000002740)=""/243, 0xf3}}], 0x3, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000000340)=""/207, &(0x7f0000000440)=0xcf) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f00000006c0)={0x0}}, 0x4810) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000000c0)={0x4, 0xf003, 0xffffffffffffe660, 0xd3d8, 0x9}) accept(r2, &(0x7f0000000780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000800)=0x80) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000001200)=""/228) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000740)={0x7, 0x1b, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)="736d617073005196570b53d43b8812929048eda3747551affb") getuid() connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) preadv(r4, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 15:35:20 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000000c0)='!-@\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="87", 0x1) sendfile(r0, r0, &(0x7f0000000100), 0x2000001) [ 234.996788] binder_alloc: 7681: binder_alloc_buf failed to map page at 20001000 in userspace [ 235.029319] binder: 7681:7682 transaction failed 29201/-12, size 0-0 line 2973 [ 235.053782] binder_alloc: binder_alloc_mmap_handler: 7681 20001000-20004000 already mapped failed -16 [ 235.069248] binder: BINDER_SET_CONTEXT_MGR already set [ 235.074752] binder: 7681:7682 ioctl 40046207 0 returned -16 [ 235.090361] binder: undelivered TRANSACTION_ERROR: 29201 15:35:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$setsig(0x4203, r2, 0x0, &(0x7f0000000300)) 15:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a6, 0x7ffffffff000) 15:35:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000208911, &(0x7f0000000000)="0a5c2d0240316285717070") socket$inet6(0xa, 0x3, 0x87) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000003340)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2200201}, 0xc, &(0x7f00000022c0)={&(0x7f0000002280)={0x1c, r3, 0x220, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10}]}, 0x1c}}, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000480)=@vsock, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)=""/97, 0x61}, {&(0x7f0000000600)=""/89, 0x59}, {&(0x7f0000000680)=""/105, 0x69}, {&(0x7f0000000700)=""/99, 0x63}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x5, &(0x7f0000000800)=""/83, 0x53, 0x3ff}, 0x102) 15:35:20 executing program 3: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) 15:35:20 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = gettid() readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/240, 0xf0}], 0x1) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) dup2(r2, r0) tkill(r1, 0x15) 15:35:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) 15:35:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 15:35:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') dup3(r0, r1, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000026ff8)='./file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 15:35:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSFF(r1, 0x40304580, 0x0) 15:35:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 15:35:21 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200080003, 0x1) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r1, &(0x7f0000000140)='9', 0x1, 0x0, 0x0, 0x0) getsockname(r1, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f0000000040)=0x80) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=""/27, 0x1b}, 0xa48}, {{0x0, 0x0, &(0x7f0000002140)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002740)=""/243, 0xf3}}], 0x3, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4020}, 0xc, 0x0}, 0x4810) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000000c0)={0x4, 0xf003, 0xffffffffffffe660, 0xd3d8}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000740)={0x7, 0x1b, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="736d617073005196570b53d43b8812929048eda3747551affb") getuid() connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 15:35:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1310) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, 0x0, 0x0) 15:35:21 executing program 2: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000002c0)=""/167, 0xa7}, {&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000380)=""/29, 0x1d}], 0x4}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000005e0081aee4050c00000f0000008bc609f6d8ffffff9e000000000000000000", 0x23}], 0x1}, 0x0) 15:35:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 15:35:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x42a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) 15:35:21 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/packet\x00') 15:35:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80400000001, 0x240) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x80000001, 0x4) sendto$inet(r0, &(0x7f0000000100), 0xffffffffffffff1f, 0x0, 0x0, 0x56c3) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000040), 0x14) 15:35:21 executing program 2: socketpair$unix(0x1, 0x200000000002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 236.240896] mmap: syz-executor5 (7780) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 15:35:21 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x200080003, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x7, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000001c40)=[{0x0}], 0x1, &(0x7f0000001c80)=""/27, 0x1b}, 0xa48}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002580)=""/3, 0x3}], 0x1, &(0x7f0000002740)=""/243, 0xf3}}], 0x2, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000000340)=""/207, &(0x7f0000000440)=0xcf) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f00000006c0)={0x0}}, 0x4810) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000000c0)={0x4, 0xf003, 0xffffffffffffe660, 0x0, 0x9}) accept(0xffffffffffffffff, &(0x7f0000000780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000800)=0x80) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001200)=""/228) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f00000001c0)="2f6465762f04ebd9b182c21e37c7413854000000000000000000000000") write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000740)={0x7, 0x1b, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)="736d617073005196570b53d43b8812929048eda3747551affb") getuid() connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 15:35:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) 15:35:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000020008007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '/dev/kvm\x00'}, &(0x7f0000000140)='/dev/kvm\x00', 0x9, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) lstat(0x0, &(0x7f0000000940)) stat(&(0x7f0000000600)='./file0\x00', 0x0) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x30000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 236.596216] ISOFS: Unable to identify CD-ROM format. 15:35:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_score_adj\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) 15:35:22 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) sched_setscheduler(r1, 0x7, &(0x7f00000001c0)=0x87) times(&(0x7f0000000180)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xffffffff, 0x1f, 0x1000, 0x2, 0x0, 0x5, 0x0, 0x0, 0x9, 0xb64b, 0x4e, 0x5, 0x8001, 0x3, 0x101, 0x6, 0x3, 0x9, 0x8, 0x6, 0x500000, 0x2, 0x27d4, 0x4, 0xfff, 0x1, 0x2b1, 0x2b, 0x0, 0xfffffffffffeffff, 0xc8b2, 0x2, 0x81, 0x80000001, 0x0, 0xfe2, 0x0, 0x290, 0x2, @perf_config_ext={0x9, 0x80000001}, 0x400, 0x100000000, 0x81, 0x8, 0x37, 0xfffffffffffffeff, 0x1f}, r1, 0x4, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrandom(&(0x7f00000010c0)=""/80, 0x50, 0x2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x30) 15:35:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:22 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000400)='.\x00', 0xfe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) 15:35:22 executing program 1: r0 = msgget$private(0x0, 0x80) r1 = geteuid() r2 = getegid() r3 = getegid() getpgrp(0x0) getpgrp(0xffffffffffffffff) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000400)={{0x905597, r1, r2, 0x0, r3, 0x8, 0x8}, 0x9, 0x6, 0x2, 0xfffffffffffffffa, 0xfffffffffffffc00, 0xffffffffffffffff}) syz_init_net_socket$llc(0x1a, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000600)="1b", 0x1, 0x8050, 0x0, 0x0) close(r4) [ 236.907155] ISOFS: Unable to identify CD-ROM format. 15:35:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 15:35:22 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x6, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x15, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7040000020000006a0a00fe000000088500000020000000b7000000000000009500040000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000080)="bd25e7b9d668c6e5db803ff1dcbd", 0x0, 0xe54c}, 0x28) 15:35:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000100)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYBLOB="90010000d4a1aaaa548b7a76bbcd8941848695d138b81240c3f1657d06d485c1a585fc4786c619f71c7c8faedcc03a3683683758ab793fd003874d8e8a432d53b033df5367243f5328453f83f5c2aceb3e13d36fa76d4b0940e30469c13ffdf9cd9c2273e6252efed0ce4af07a2ef3e250b9c4d084228b2fd8f81fe077015afa1b5b63fd9f0ccca1d3bb6c68757c726b0df00fc79a62f6c3848e23db869d5b4504d72c0f24b55115e5367df7aa9fa2fd6da4f840b5fdd08adf1b2f466fb93ca61a2567caed14ee336d34c91b016a1176cbf6a9e87709633d492ef04f8c80d06a521409175817341d36ba40e826c9f1e7e585520cfb00c512c2ab6c0e05cb0b9feb5a5fe9e3dbf919f7668e9a715174a2faecc2e878a51cd575e5dfee061bfff0631ada985709d043b3da15fb80f3cebfd6fb598d7737c44b0109cbf04e640206c854b64fc1532dd8e11ebeb1c1b6695e234d71ac8f2418338e83360aff9dd60090a132fdf146214580995b51ff95a70a0c0da76c9d20ad9447bbe42d491ff6150d2b4b6ef72b6305b9711ec67f2e0ebe41aaa900d01d15ec4beb0a95aad6660d58938ff8d55415"], 0x0) 15:35:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") msgsnd(0x0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) 15:35:22 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x0, 0x0, 0x0, 0x0) 15:35:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1}, 0x102) 15:35:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffb5}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 15:35:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d9, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 15:35:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="c765c40031be", [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 15:35:22 executing program 2: r0 = memfd_create(0x0, 0x0) sysinfo(0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x8, 0x0, 0x47}) open(0x0, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) socket(0x0, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) socket(0x0, 0x0, 0x0) [ 237.486240] attempt to access beyond end of device [ 237.499776] loop4: rw=4096, want=136, limit=17 [ 237.504408] gfs2: error 10 reading superblock 15:35:22 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x101006, 0x0) r1 = memfd_create(&(0x7f0000000200)='em1\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="c30f10000002"], 0x6) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0x0, 0x3}, 0xb) sendfile(r0, r1, &(0x7f0000000000), 0x800) 15:35:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000020008007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '/dev/kvm\x00'}, &(0x7f0000000140)='/dev/kvm\x00', 0x9, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 237.580391] syz-executor0 (7856) used greatest stack depth: 14920 bytes left 15:35:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000600)=""/89, 0x59}, {0x0}, {0x0}], 0x3, &(0x7f0000000800)=""/83, 0x53, 0x3ff}, 0x0) 15:35:22 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x101006, 0x0) r1 = memfd_create(&(0x7f0000000200)='em1\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000002"], 0x6) write$P9_RWRITE(r1, &(0x7f0000000080)={0x4}, 0xb) sendfile(r0, r1, &(0x7f0000000000), 0x800) 15:35:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) [ 237.746126] kvm [7880]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0xc1 data 0x4000 15:35:23 executing program 4: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) 15:35:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 15:35:23 executing program 0: restart_syscall() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, 0x0}}], 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 15:35:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000020008007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '/dev/kvm\x00'}, &(0x7f0000000140)='/dev/kvm\x00', 0x9, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:23 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x402c5342, &(0x7f0000000080)={0x0, 0x0, 'client0\x00', 0x0, "62279869fd3de01f", "48d755512dcb6c84378c5d6ebff4caa2ee2903faa147f032504cf3c24b77ffc0"}) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 15:35:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) 15:35:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000002c0)={r2, 0x1, 0x6, @local}, 0x10) 15:35:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000020008007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '/dev/kvm\x00'}, 0x0, 0x0, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000780)={[{@creator={'creator', 0x3d, "fe3e665d"}}], [{@subj_user={'subj_user', 0x3d, 'vmnet1mime_type,'}}, {@smackfsroot={'smackfsroot', 0x3d, 'ppp1eth1'}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000004001a00"], 0x1}}, 0x0) [ 238.414134] device team0 entered promiscuous mode [ 238.423699] kvm [7906]: vcpu0, guest rIP: 0x2db disabled perfctr wrmsr: 0xc1 data 0x4000 [ 238.427827] device team_slave_0 entered promiscuous mode [ 238.477984] device team_slave_1 entered promiscuous mode 15:35:23 executing program 1: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000380)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xc) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x810005, 0x0) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000000)='f', 0x1}], 0x1, 0x0) 15:35:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) 15:35:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000020008007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '/dev/kvm\x00'}, &(0x7f0000000140)='/dev/kvm\x00', 0x9, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 238.536142] device team0 left promiscuous mode [ 238.555888] device team_slave_0 left promiscuous mode [ 238.590939] device team_slave_1 left promiscuous mode 15:35:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:35:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000020008007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'os2.', '/dev/kvm\x00'}, 0x0, 0x0, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x30000, &(0x7f0000000780)={[{@creator={'creator', 0x3d, "fe3e665d"}}], [{@subj_user={'subj_user', 0x3d, 'vmnet1mime_type,'}}, {@smackfsroot={'smackfsroot', 0x3d, 'ppp1eth1'}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:24 executing program 4: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x1800) 15:35:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) 15:35:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) 15:35:24 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) munlock(&(0x7f0000383000/0x3000)=nil, 0x3000) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r1, &(0x7f0000000280)=0x4, 0x80000003) 15:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a6, 0x7ffffffff000) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) 15:35:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) unlink(0x0) write$P9_RREADDIR(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b7) fstat(r0, &(0x7f0000000380)) ioctl$int_in(r1, 0x5421, &(0x7f0000000480)) get_thread_area(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x62, 0x200, 0x3}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(0x0, r2, 0xffffffffffffffff, r1, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) [ 239.382686] IPVS: ftp: loaded support on port[0] = 21 15:35:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) 15:35:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000340)) 15:35:24 executing program 4: socket$inet(0x2, 0x0, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) mknod(&(0x7f00000000c0)='./file1\x00', 0xc009, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x600, 0x0) read(r0, &(0x7f0000001ac0)=""/11, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, 0x0) 15:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a6, 0x7ffffffff000) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) 15:35:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:24 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1/file1\x00', 0x0, 0x0) rename(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000100)='./file0\x00') 15:35:25 executing program 2: 15:35:25 executing program 2: 15:35:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000340)) [ 240.158331] IPVS: ftp: loaded support on port[0] = 21 15:35:25 executing program 2: 15:35:25 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='vboxnet0@wlan0\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 15:35:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() ioprio_set$pid(0x0, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000340)) 15:35:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) unlink(0x0) write$P9_RREADDIR(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b7) fstat(r0, &(0x7f0000000380)) ioctl$int_in(r1, 0x5421, &(0x7f0000000480)) get_thread_area(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x62, 0x200, 0x3}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(0x0, r2, 0xffffffffffffffff, r1, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace(0x4207, 0x0) 15:35:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@ipv4={[], [], @loopback}, 0x5}, 0x20) 15:35:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x72, &(0x7f0000000200), &(0x7f0000000240)=0x8) [ 240.766054] IPVS: ftp: loaded support on port[0] = 21 15:35:26 executing program 1: 15:35:26 executing program 4: 15:35:26 executing program 4: 15:35:26 executing program 1: 15:35:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:26 executing program 2: 15:35:26 executing program 4: 15:35:26 executing program 0: 15:35:26 executing program 1: 15:35:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:26 executing program 2: 15:35:26 executing program 4: 15:35:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) getpid() r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:26 executing program 1: 15:35:26 executing program 0: 15:35:26 executing program 1: 15:35:26 executing program 0: 15:35:27 executing program 2: 15:35:27 executing program 4: 15:35:27 executing program 1: 15:35:27 executing program 2: 15:35:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:27 executing program 0: 15:35:27 executing program 4: 15:35:27 executing program 1: 15:35:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:27 executing program 2: 15:35:27 executing program 2: 15:35:27 executing program 4: 15:35:27 executing program 1: 15:35:27 executing program 0: 15:35:27 executing program 2: 15:35:27 executing program 4: 15:35:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:28 executing program 1: 15:35:28 executing program 4: 15:35:28 executing program 2: 15:35:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:28 executing program 0: 15:35:28 executing program 2: 15:35:28 executing program 4: 15:35:28 executing program 0: 15:35:28 executing program 1: 15:35:28 executing program 2: 15:35:28 executing program 4: 15:35:28 executing program 1: 15:35:28 executing program 0: 15:35:28 executing program 4: 15:35:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x10040, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:28 executing program 2: 15:35:28 executing program 1: 15:35:28 executing program 4: 15:35:28 executing program 0: 15:35:28 executing program 1: 15:35:28 executing program 2: 15:35:28 executing program 4: 15:35:28 executing program 0: 15:35:28 executing program 2: 15:35:28 executing program 1: 15:35:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:28 executing program 4: 15:35:28 executing program 2: 15:35:28 executing program 1: 15:35:28 executing program 0: 15:35:28 executing program 1: 15:35:28 executing program 4: 15:35:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:28 executing program 2: 15:35:28 executing program 1: 15:35:28 executing program 0: 15:35:29 executing program 4: 15:35:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) mount(&(0x7f0000000540)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f0000000340)) 15:35:29 executing program 2: 15:35:29 executing program 1: 15:35:29 executing program 0: 15:35:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a08"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)=0x204080c8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:29 executing program 4: 15:35:29 executing program 1: 15:35:29 executing program 2: 15:35:29 executing program 0: 15:35:29 executing program 4: [ 244.043663] ------------[ cut here ]------------ [ 244.048452] DEBUG_LOCKS_WARN_ON(depth <= 0) [ 244.048672] WARNING: CPU: 0 PID: 8156 at kernel/locking/lockdep.c:3595 lock_release+0x740/0xa10 [ 244.061841] Kernel panic - not syncing: panic_on_warn set ... [ 244.067743] CPU: 0 PID: 8156 Comm: syz-executor5 Not tainted 4.20.0-rc1-next-20181109+ #110 [ 244.076242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.085607] Call Trace: [ 244.088248] dump_stack+0x244/0x39d [ 244.091899] ? dump_stack_print_info.cold.1+0x20/0x20 [ 244.097176] panic+0x2ad/0x55c [ 244.100387] ? add_taint.cold.5+0x16/0x16 [ 244.104554] ? __warn.cold.8+0x5/0x45 [ 244.108381] ? lock_release+0x740/0xa10 [ 244.112374] __warn.cold.8+0x20/0x45 [ 244.116104] ? lock_release+0x740/0xa10 [ 244.120089] report_bug+0x254/0x2d0 [ 244.123761] do_error_trap+0x11b/0x200 [ 244.127665] do_invalid_op+0x36/0x40 [ 244.131390] ? lock_release+0x740/0xa10 [ 244.135410] invalid_op+0x14/0x20 [ 244.138876] RIP: 0010:lock_release+0x740/0xa10 [ 244.143471] Code: 03 38 d0 7c 08 84 d2 0f 85 da 02 00 00 8b 35 a7 95 b3 08 85 f6 75 15 48 c7 c6 20 66 2b 88 48 c7 c7 c0 33 2b 88 e8 10 36 e7 ff <0f> 0b 48 8b 95 e8 fe ff ff 4c 89 f7 48 8b b5 f0 fe ff ff e8 e8 58 [ 244.162380] RSP: 0018:ffff88017c68f868 EFLAGS: 00010086 [ 244.167749] RAX: 0000000000000000 RBX: 1ffff1002f8d1f12 RCX: ffffc9000fe71000 [ 244.175025] RDX: 0000000000007e32 RSI: ffffffff8165ba15 RDI: 0000000000000006 [ 244.182301] RBP: ffff88017c68f998 R08: ffff8801bedee540 R09: fffffbfff12b2254 [ 244.189575] R10: fffffbfff12b2254 R11: ffffffff895912a3 R12: ffffffff8b0e27a0 [ 244.196850] R13: ffff88017c68f970 R14: ffff8801bedee540 R15: ffff88017c68f8b0 [ 244.204183] ? vprintk_func+0x85/0x181 [ 244.208085] ? lock_release+0x740/0xa10 [ 244.212124] ? loop_control_ioctl+0xf5/0x4e0 [ 244.216571] ? lock_downgrade+0x900/0x900 [ 244.220729] ? __radix_tree_lookup+0x3a7/0x500 [ 244.225323] ? radix_tree_insert+0x870/0x870 [ 244.229744] ? find_held_lock+0x36/0x1c0 [ 244.233822] __mutex_unlock_slowpath+0x102/0x8c0 [ 244.238599] ? __fget+0x4aa/0x740 [ 244.242064] ? wait_for_completion+0x8a0/0x8a0 [ 244.246681] ? check_preemption_disabled+0x48/0x280 [ 244.251711] ? radix_tree_lookup+0x21/0x30 [ 244.255951] ? idr_find+0x44/0x50 [ 244.259415] ? loop_lookup+0x105/0x230 [ 244.263310] ? loop_exit_cb+0x20/0x20 [ 244.267125] mutex_unlock+0xd/0x10 [ 244.270701] loop_control_ioctl+0xf5/0x4e0 [ 244.274949] ? loop_add+0xa20/0xa20 [ 244.278625] ? __might_fault+0x12b/0x1e0 [ 244.282702] ? lock_downgrade+0x900/0x900 [ 244.286861] ? lock_release+0xa10/0xa10 [ 244.290886] ? perf_trace_sched_process_exec+0x860/0x860 [ 244.296349] ? loop_add+0xa20/0xa20 [ 244.300009] do_vfs_ioctl+0x1de/0x1790 [ 244.303911] ? ioctl_preallocate+0x300/0x300 [ 244.308330] ? __fget_light+0x2e9/0x430 [ 244.312318] ? fget_raw+0x20/0x20 [ 244.315775] ? _copy_to_user+0xc8/0x110 [ 244.319788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.325379] ? put_timespec64+0x10f/0x1b0 [ 244.329584] ? nsecs_to_jiffies+0x30/0x30 [ 244.333776] ? do_syscall_64+0x9a/0x820 [ 244.337766] ? do_syscall_64+0x9a/0x820 [ 244.341752] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 244.346389] ? security_file_ioctl+0x94/0xc0 [ 244.350811] ksys_ioctl+0xa9/0xd0 [ 244.354275] __x64_sys_ioctl+0x73/0xb0 [ 244.358190] do_syscall_64+0x1b9/0x820 [ 244.362089] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.367512] ? syscall_return_slowpath+0x5e0/0x5e0 [ 244.372449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.377344] ? trace_hardirqs_on_caller+0x310/0x310 [ 244.382376] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 244.387400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.392945] ? prepare_exit_to_usermode+0x291/0x3b0 [ 244.397971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.402827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.408022] RIP: 0033:0x457569 [ 244.411224] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.430128] RSP: 002b:00007f021789cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.437869] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 244.445145] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000004 [ 244.452442] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 244.459716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f021789d6d4 [ 244.467565] R13: 00000000004c06f1 R14: 00000000004d1028 R15: 00000000ffffffff [ 244.475882] Kernel Offset: disabled [ 244.479581] Rebooting in 86400 seconds..