[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.420910][ T26] audit: type=1800 audit(1568510454.565:25): pid=8547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.459281][ T26] audit: type=1800 audit(1568510454.565:26): pid=8547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.492773][ T26] audit: type=1800 audit(1568510454.575:27): pid=8547 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. 2019/09/15 01:21:04 fuzzer started 2019/09/15 01:21:06 dialing manager at 10.128.0.26:41177 2019/09/15 01:21:06 syscalls: 2487 2019/09/15 01:21:06 code coverage: enabled 2019/09/15 01:21:06 comparison tracing: enabled 2019/09/15 01:21:06 extra coverage: extra coverage is not supported by the kernel 2019/09/15 01:21:06 setuid sandbox: enabled 2019/09/15 01:21:06 namespace sandbox: enabled 2019/09/15 01:21:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/15 01:21:06 fault injection: enabled 2019/09/15 01:21:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/15 01:21:06 net packet injection: enabled 2019/09/15 01:21:06 net device setup: enabled 01:23:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000080)=""/224, 0xe0) 01:23:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2b, 0x801, 0x0) sendmmsg$inet_sctp(r1, &(0x7f00000008c0)=[{0x0, 0x0, 0x0}], 0x1, 0x20000010) syzkaller login: [ 237.391249][ T8713] IPVS: ftp: loaded support on port[0] = 21 01:23:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$OBJ_GET_MAP(0x9, 0x0, 0x0) [ 237.522222][ T8713] chnl_net:caif_netlink_parms(): no params data found [ 237.542748][ T8715] IPVS: ftp: loaded support on port[0] = 21 [ 237.591377][ T8713] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.598903][ T8713] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.616217][ T8713] device bridge_slave_0 entered promiscuous mode [ 237.644404][ T8713] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.659229][ T8713] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.689246][ T8713] device bridge_slave_1 entered promiscuous mode [ 237.733017][ T8713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.748293][ T8713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:23:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") getdents(0xffffffffffffffff, 0xfffffffffffffffd, 0x2c) [ 237.816955][ T8718] IPVS: ftp: loaded support on port[0] = 21 [ 237.826992][ T8713] team0: Port device team_slave_0 added [ 237.874286][ T8713] team0: Port device team_slave_1 added [ 237.972294][ T8713] device hsr_slave_0 entered promiscuous mode [ 238.019538][ T8713] device hsr_slave_1 entered promiscuous mode 01:23:55 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xbd, &(0x7f00000012c0), &(0x7f0000000100)=0x4) [ 238.071558][ T8715] chnl_net:caif_netlink_parms(): no params data found [ 238.127827][ T8721] IPVS: ftp: loaded support on port[0] = 21 [ 238.155560][ T8713] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.162807][ T8713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.170714][ T8713] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.177803][ T8713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.325499][ T8715] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.334978][ T8715] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.344261][ T8715] device bridge_slave_0 entered promiscuous mode 01:23:55 executing program 5: syz_emit_ethernet(0x36, &(0x7f00000002c0)={@local, @empty=[0x0, 0xd00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1=0xe000f000}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 238.391364][ T8715] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.398448][ T8715] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.410995][ T8715] device bridge_slave_1 entered promiscuous mode [ 238.434949][ T8725] IPVS: ftp: loaded support on port[0] = 21 [ 238.443944][ T8718] chnl_net:caif_netlink_parms(): no params data found [ 238.483512][ T8713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.566788][ T8715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.579353][ T8715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.595451][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.604108][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.613355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 238.636796][ T8721] chnl_net:caif_netlink_parms(): no params data found [ 238.667150][ T8728] IPVS: ftp: loaded support on port[0] = 21 [ 238.688583][ T8715] team0: Port device team_slave_0 added [ 238.723289][ T8713] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.730852][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.738551][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.747954][ T8715] team0: Port device team_slave_1 added [ 238.760100][ T8718] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.767186][ T8718] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.775229][ T8718] device bridge_slave_0 entered promiscuous mode [ 238.782542][ T8721] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.790064][ T8721] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.797842][ T8721] device bridge_slave_0 entered promiscuous mode [ 238.807489][ T8721] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.815103][ T8721] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.823359][ T8721] device bridge_slave_1 entered promiscuous mode [ 238.850588][ T8718] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.857656][ T8718] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.865617][ T8718] device bridge_slave_1 entered promiscuous mode [ 238.880118][ T8721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.891614][ T8721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.936921][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.945839][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.954425][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.961522][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.042345][ T8715] device hsr_slave_0 entered promiscuous mode [ 239.079574][ T8715] device hsr_slave_1 entered promiscuous mode [ 239.119431][ T8715] debugfs: Directory 'hsr0' with parent '/' already present! [ 239.156787][ T8718] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.169365][ T8718] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.184571][ T8721] team0: Port device team_slave_0 added [ 239.197689][ T8721] team0: Port device team_slave_1 added [ 239.227783][ T8718] team0: Port device team_slave_0 added [ 239.236710][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.245911][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.254955][ T3701] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.262021][ T3701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.295601][ T8718] team0: Port device team_slave_1 added [ 239.302267][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.313287][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.323068][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.331932][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.391485][ T8721] device hsr_slave_0 entered promiscuous mode [ 239.429695][ T8721] device hsr_slave_1 entered promiscuous mode [ 239.480926][ T8721] debugfs: Directory 'hsr0' with parent '/' already present! [ 239.490761][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.498861][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.507773][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.517466][ T8725] chnl_net:caif_netlink_parms(): no params data found [ 239.539376][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.547683][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.556410][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.564801][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.621475][ T8718] device hsr_slave_0 entered promiscuous mode [ 239.659672][ T8718] device hsr_slave_1 entered promiscuous mode [ 239.699384][ T8718] debugfs: Directory 'hsr0' with parent '/' already present! [ 239.716335][ T8713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.774520][ T8725] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.783227][ T8725] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.791172][ T8725] device bridge_slave_0 entered promiscuous mode [ 239.807377][ T8715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.826270][ T8725] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.834358][ T8725] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.843351][ T8725] device bridge_slave_1 entered promiscuous mode [ 239.853805][ T8713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.885186][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.893883][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.925738][ T8715] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.952404][ T8725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.981597][ T8728] chnl_net:caif_netlink_parms(): no params data found [ 240.001924][ T8725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.030298][ T8718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.050854][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.060258][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.069002][ T8729] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.076100][ T8729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.087430][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.102133][ T8718] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.127390][ T8725] team0: Port device team_slave_0 added [ 240.146770][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.155742][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.163939][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.172678][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.181348][ T8729] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.188391][ T8729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.196012][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.204772][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.231330][ T8721] 8021q: adding VLAN 0 to HW filter on device bond0 01:23:57 executing program 0: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000440)="60dc21fdd7bf5c1df0167a7686065e7b9de84560e5144b75420a9934fa7e14a3b6492edf5cfb7168ff1d5f0868ced68587bcf0ccf63e2a71f9d57c48599d56547131c61a73a8a9151b02780570e9a3c298208fe65ab86d999b726f2c", 0x5c}], 0x1}}], 0x1, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x220141042, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 240.257570][ T8725] team0: Port device team_slave_1 added [ 240.284377][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.295670][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.306528][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.319733][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.328145][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.335259][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.339683][ T8742] tmpfs: Unknown parameter ',1sxp˜ Zmro' 01:23:57 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) [ 240.354057][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.363949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.365090][ T8743] tmpfs: Unknown parameter ',1sxp˜ Zmro' [ 240.372911][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.388006][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.397530][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.404661][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.412796][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.422985][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 01:23:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @rand_addr=0x100000001}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x800000029, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) [ 240.448844][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.458074][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.473512][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.484911][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.502557][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.521808][ T8728] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.528868][ T8728] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.538897][ T8728] device bridge_slave_0 entered promiscuous mode [ 240.548785][ T8715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:23:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 240.576328][ T8728] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.583793][ T8728] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.595563][ T8728] device bridge_slave_1 entered promiscuous mode [ 240.607274][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.616458][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.630408][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.663693][ T8721] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.678092][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.693142][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.702486][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.711271][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.719979][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.728179][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.737054][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.745746][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 01:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@fat=@check_strict='check=strict'}]}) [ 240.782033][ T8725] device hsr_slave_0 entered promiscuous mode [ 240.787531][ C0] hrtimer: interrupt took 23843 ns [ 240.812887][ T8725] device hsr_slave_1 entered promiscuous mode [ 240.869728][ T8725] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.880019][ T8718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 240.904902][ T8728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.934365][ T8761] FAT-fs (loop0): bogus number of reserved sectors [ 240.942860][ T8761] FAT-fs (loop0): Can't find a valid FAT filesystem [ 240.943567][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.957819][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.966644][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.975352][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.982475][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.017740][ T8761] FAT-fs (loop0): bogus number of reserved sectors [ 241.034228][ T8728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.039241][ T8761] FAT-fs (loop0): Can't find a valid FAT filesystem [ 241.051899][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:23:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$inet(0xa, 0x801, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x356, 0x0, 0x0, 0x0) [ 241.061162][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.070475][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.078796][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.085897][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.094224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.105908][ T8715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.154447][ T8718] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.167933][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 241.220546][ T8728] team0: Port device team_slave_0 added [ 241.246889][ T8728] team0: Port device team_slave_1 added [ 241.264096][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.266486][ T8774] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 241.280198][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.323601][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.349026][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.379331][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 241.398614][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 241.408416][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.417231][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 01:23:58 executing program 0: unshare(0x8000400) r0 = mq_open(&(0x7f0000000040)='-$\x00', 0x6e93ebbbcc0884f7, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x4) [ 241.427963][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 241.486673][ T8721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.542858][ T8728] device hsr_slave_0 entered promiscuous mode [ 241.599661][ T8728] device hsr_slave_1 entered promiscuous mode [ 241.639368][ T8728] debugfs: Directory 'hsr0' with parent '/' already present! [ 241.681156][ T8725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.704458][ T8721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.743078][ T8725] 8021q: adding VLAN 0 to HW filter on device team0 [ 241.792098][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.813725][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.839393][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.847922][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.863123][ T3701] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.870277][ T3701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.886949][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.907086][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.916051][ T3701] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.923192][ T3701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.931487][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:23:59 executing program 1: socket(0xa, 0x802, 0x0) syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) pipe(&(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 01:23:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) [ 241.975591][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.998331][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.023575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.046582][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.056269][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.088550][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.196184][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.211742][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.234079][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.247785][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.258150][ T3701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.272327][ T8725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:23:59 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) [ 242.300910][ T8728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.317282][ T8725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 242.335196][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.361273][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.386496][ T8728] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.411883][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.423376][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.446790][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.453942][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.480316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.488182][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.497883][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.510601][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.517664][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.525378][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.534195][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.550956][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.565036][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.574155][ T8729] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.598766][ T8728] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 242.616905][ T8728] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 01:23:59 executing program 4: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x7}) [ 242.641033][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.656235][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.665090][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.674821][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.684006][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.692765][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.710530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.749052][ T8728] 8021q: adding VLAN 0 to HW filter on device batadv0 01:24:00 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = dup(r0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 01:24:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f00000001c0)) 01:24:00 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) 01:24:00 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0xf432, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@lsrr={0x83, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 01:24:00 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'\"tack ', '+\x00'}, 0x8) 01:24:00 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000040), 0x10) [ 242.916206][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 242.916217][ T26] audit: type=1400 audit(1568510640.055:31): apparmor="DENIED" operation="setprocattr" info="current" error=-22 profile="unconfined" pid=8840 comm="syz-executor.3" 01:24:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a1100008f2cd6cc62e13f10a5f31a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0fafa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvmmsg(r0, &(0x7f00000071c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff74}}, {{0x0, 0x0, 0x0}}], 0x216, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) 01:24:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x12, 0x0, &(0x7f0000000040)) 01:24:00 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0) read(r0, 0x0, 0x5ca) 01:24:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x10000000003, 0x9) r2 = dup2(r1, r1) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000500)="24000000ed0307041dfffdd46fa2830020200a0009ed0800000085680c1ba3a20400ff7e280000005304ffffba16a0aa1c0009b356da5a80d18b6e06e9fd62664b173e6108372455a4df49d0", 0x4c}], 0x1}, 0x0) 01:24:00 executing program 0: socket$rds(0x15, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) pipe(0x0) unshare(0x40000000) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0xff5d) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x8001]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) [ 243.138946][ T26] audit: type=1107 audit(1568510640.275:32): pid=8859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='VZыnbfK>a7$UI' 01:24:00 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) [ 243.201927][ T26] audit: type=1107 audit(1568510640.275:33): pid=8859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='VZыnbfK>a7$UI' 01:24:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(xtea)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000004cc0)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)='h', 0x1}], 0x1}], 0x1, 0x0) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000580)=""/4096, 0x20001580}], 0x1}, 0x0) 01:24:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) close(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x28, 0x8, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x2, [0x0, 0x0]}}]}]}, 0x4c}}, 0x0) 01:24:00 executing program 4: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 243.278449][ T8874] IPVS: ftp: loaded support on port[0] = 21 01:24:00 executing program 4: gettid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc01c7c02, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f0000000040)="0f20e06635100000000f22e0660f20d9d18900000f01df3e360fc76b007a0cb8b6008ee80f070f0966b9bb0b000066b80000000066ba000000000f30", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:24:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x433, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RCLUNK(r1, &(0x7f0000000000)={0x7}, 0x7) fallocate(r1, 0x0, 0x0, 0x2000402) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 01:24:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) [ 243.561129][ T8876] IPVS: ftp: loaded support on port[0] = 21 01:24:00 executing program 5: ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000002c0)="19") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000100)={0x0, &(0x7f0000000180)="52eb7eb5828985dd897bc622ec6689dee01eeecdfbb0bb14d0b9310257318cb6803e63400a3e57f4281982ad6b643cc747cd"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:24:01 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x3) 01:24:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @remote}, 0x10) 01:24:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 01:24:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$sock(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)='!', 0x1}, {&(0x7f0000000200)="a1e8f6c11eaf8c615af160233164b1", 0xf}], 0x2}}], 0x1, 0x0) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) 01:24:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x20001000006}]}) 01:24:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) clock_settime(0x5, &(0x7f0000000080)={0x77359400}) 01:24:01 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x3) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 244.504399][ T26] audit: type=1326 audit(1568510641.645:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8939 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x0 01:24:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x5, 0x0, &(0x7f00000001c0)) 01:24:01 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)) 01:24:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$binfmt_elf64(r0, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [], "", [[], [], []]}, 0x340) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac610ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 01:24:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) sendmsg$netlink(r0, &(0x7f00000041c0)={0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000000940)={0x10, 0x13, 0x1}, 0x10}], 0x1}, 0x0) 01:24:02 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) 01:24:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) 01:24:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:24:02 executing program 5: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x7, 0x2}) 01:24:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000600)={0x2, 'vxcan1\x00'}, 0x18) [ 245.203971][ T8989] debugfs: File 'dropped' in directory 'sg0' already present! [ 245.220537][ T26] audit: type=1326 audit(1568510642.365:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8939 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0x0 01:24:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) listen(r0, 0x5) listen(r0, 0x0) 01:24:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x78) [ 245.280384][ T8989] debugfs: File 'msg' in directory 'sg0' already present! [ 245.315031][ T8995] IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 245.333176][ T8989] debugfs: File 'trace0' in directory 'sg0' already present! 01:24:02 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000540)) 01:24:02 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x8002, 0x0) pwritev(r3, &(0x7f00000006c0)=[{&(0x7f0000000380)="89ee6ec577a0e2be0b1781980c1d69f73c8b8be4b590111f2d18681e51dd58ee09aa88d898fd001465c03c3c751e698c487c9b960ff3f1559dd24e6d0129cf97697ce964fba5b90495d63c2e70d50707d0", 0x51}, {&(0x7f0000000440)="e7919463bb2bed6cc35aaf44d4a53722a0e1610e8b71c096d89525a36b33f3b53370d06ab560b1d813d22f301c9b67116cefa64db3f5107cbf24c3bf43eeffa69188aa63ba17988d99eeeee9803864ae03e7a692caf7aed2c5ec5781506868617405c9b2f5228e1ae3f70901", 0x6c}, {0x0}], 0x3, 0x0) 01:24:02 executing program 1: write$capi20_data(0xffffffffffffffff, &(0x7f0000000100)={{0x10}, 0x23, "5882df528a5130d599bad209a2034e721aba6d1a68be400150faa7e5c47db2787b1c39"}, 0x35) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 01:24:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 01:24:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000005a80), 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000001}, 0xb) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)='a', 0x1}], 0x1}, 0x0) shutdown(r1, 0x1) 01:24:02 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:24:02 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000), &(0x7f0000000040)=0x8) 01:24:03 executing program 1: write$capi20_data(0xffffffffffffffff, &(0x7f0000000100)={{0x10}, 0x23, "5882df528a5130d599bad209a2034e721aba6d1a68be400150faa7e5c47db2787b1c39"}, 0x35) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) [ 245.870289][ T9033] Invalid option length (894) for dns_resolver key [ 245.877443][ T9036] Invalid option length (894) for dns_resolver key 01:24:03 executing program 0: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000f20000003179bda01c8cfb5735da5cf53ad903eef2aab4ac01718fb12fd7209c213b063c8d537deebe"], 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) 01:24:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)={[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 01:24:03 executing program 5: clone(0x20001fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/235, &(0x7f00000001c0)=0xeb) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 01:24:03 executing program 1: write$capi20_data(0xffffffffffffffff, &(0x7f0000000100)={{0x10}, 0x23, "5882df528a5130d599bad209a2034e721aba6d1a68be400150faa7e5c47db2787b1c39"}, 0x35) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 01:24:03 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='e'], 0x1) lseek(r0, 0x0, 0x3) [ 246.123392][ T9051] Invalid option length (894) for dns_resolver key [ 246.151170][ T9054] overlayfs: unrecognized mount option "rootcontext=unconfined_u" or missing value 01:24:03 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a1100008f2cd6cc62e13f10a5f31a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0fafa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvmmsg(r0, &(0x7f00000071c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff74}}, {{0x0, 0x0, 0x0}}], 0x216, 0x0, 0x0) 01:24:03 executing program 5: 01:24:03 executing program 4: [ 246.357322][ T9068] Invalid option length (894) for dns_resolver key 01:24:03 executing program 1: write$capi20_data(0xffffffffffffffff, &(0x7f0000000100)={{0x10}, 0x23, "5882df528a5130d599bad209a2034e721aba6d1a68be400150faa7e5c47db2787b1c39"}, 0x35) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) [ 246.553867][ T9079] Invalid option length (894) for dns_resolver key 01:24:03 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:24:03 executing program 0: 01:24:03 executing program 5: 01:24:03 executing program 1: 01:24:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x173, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b7474797065000000000000000000000000000000000000000000000000000800000000000000000000000000f6ff6c61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff00"/371]}, 0x1eb) 01:24:04 executing program 1: 01:24:04 executing program 4: 01:24:04 executing program 0: 01:24:04 executing program 3: 01:24:04 executing program 5: 01:24:04 executing program 1: 01:24:04 executing program 4: 01:24:04 executing program 2: 01:24:04 executing program 0: 01:24:04 executing program 5: 01:24:04 executing program 4: 01:24:04 executing program 1: 01:24:04 executing program 3: 01:24:05 executing program 5: 01:24:05 executing program 1: 01:24:05 executing program 3: 01:24:05 executing program 4: 01:24:05 executing program 2: 01:24:05 executing program 0: 01:24:05 executing program 5: 01:24:05 executing program 1: 01:24:05 executing program 3: 01:24:05 executing program 2: 01:24:05 executing program 4: 01:24:05 executing program 0: 01:24:05 executing program 1: 01:24:05 executing program 5: 01:24:05 executing program 4: 01:24:05 executing program 3: 01:24:05 executing program 2: 01:24:05 executing program 0: 01:24:05 executing program 1: 01:24:05 executing program 5: 01:24:05 executing program 4: 01:24:05 executing program 0: 01:24:05 executing program 2: 01:24:05 executing program 3: 01:24:05 executing program 5: 01:24:05 executing program 1: 01:24:05 executing program 4: 01:24:05 executing program 3: 01:24:06 executing program 0: 01:24:06 executing program 1: 01:24:06 executing program 5: 01:24:06 executing program 2: 01:24:06 executing program 4: 01:24:06 executing program 3: 01:24:06 executing program 0: 01:24:06 executing program 4: 01:24:06 executing program 2: 01:24:06 executing program 5: 01:24:06 executing program 1: 01:24:06 executing program 4: 01:24:06 executing program 2: 01:24:06 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf32(r0, 0x0, 0x0) 01:24:06 executing program 3: 01:24:06 executing program 1: 01:24:06 executing program 5: 01:24:06 executing program 2: 01:24:06 executing program 3: 01:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window, @sack_perm], 0x19a) 01:24:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) fcntl$getownex(r7, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r10 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r8, r9, r10}, 0xc) getuid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r11, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) r14 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r12, r13, r14}, 0xc) fstat(r2, &(0x7f0000000780)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={0x0, r15}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r16, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r17, r18}, 0xc) getgid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) fcntl$getownex(r19, 0x10, &(0x7f00000012c0)={0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000001240)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280)={r20, r21}, 0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000012c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001300)) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000012c0)) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000001240)) 01:24:07 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/228}, 0xec, 0xe42821a6f81bd540, 0x0) [ 250.261553][ T9259] Invalid option length (894) for dns_resolver key 01:24:07 executing program 4: syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="0200a6ffffff01000000ff07000000000000630000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 250.309417][ T26] audit: type=1804 audit(1568510647.445:36): pid=9256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir263358484/syzkaller.E49Hcu/26/bus" dev="sda1" ino=16584 res=1 01:24:07 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000180)="f596d5e54a4c9abdd64e400a294af8903c2d41e10bd7aa1dd029e48882b517ca", 0x20, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000004c0)="a913cfe07de36e6d39241a742b0ae14128a0c805b6e7587e24368b7d67f38068db9e7ad34c99cab44f960038aaf1f02e1893b75eb609b9fb49d11eb5277408acda79542f5423630ad0afaf216951b417703f8a7332fca640bfd759a82a61369830cc011749ee4f86e2eea5a4f5ba9289e1c2ad129b1a0288baf01a1ce33f9e1ee8c3f62153ffdd4121cb1871074c6b167a78511a3a73fabbc40c344e74e87af6263bc393afc6df85578a9c67bd2aed8e7598c8403ab6e05426c996ecbd27e700", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 250.383125][ T9264] kvm: emulating exchange as write 01:24:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="940000162f809cd54cd45800", @ANYRES16=0x0, @ANYBLOB="00000000000000000000140000006000050008000100657468000c000200080003000200000014000200080002001fb9ffff0800040000000000340002000800030000000000080002000700000008000100000000000800020000000000080001001e00000008000400008000002000020004000400080001007f000000080002003f0000000800010000000000"], 0x94}}, 0x10008043) 01:24:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\xae\x00\x00\x00\xe1\x00\x00\x00\x00\x00\x00\x80', 0x4001}) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @remote, 0x1, 0x1, [@rand_addr]}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) [ 250.520389][ T26] audit: type=1804 audit(1568510647.665:37): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir319801594/syzkaller.RT7AQ0/20/bus" dev="sda1" ino=16585 res=1 01:24:07 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000fb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000180)={0x1, 0x0, [{}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:24:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 250.732537][ T26] audit: type=1804 audit(1568510647.875:38): pid=9256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir263358484/syzkaller.E49Hcu/26/bus" dev="sda1" ino=16584 res=1 [ 250.790302][ T9278] ldm_validate_privheads(): Disk read failed. [ 250.843780][ T9278] loop4: p1 p2 01:24:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) [ 250.872202][ T9278] loop4: partition table partially beyond EOD, truncated 01:24:08 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) close(0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) [ 250.920254][ T9278] loop4: p1 start 1 is beyond EOD, truncated [ 250.962923][ T9278] loop4: p2 size 327680 extends beyond EOD, truncated 01:24:08 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3f, 0x21}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 01:24:08 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) socket$unix(0x1, 0x0, 0x0) 01:24:08 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='changehat 0x0000000000000000^\\\x00/proc/thread-self/attr/current\x00/proc/thread-self/attr/current\x00^trustedmime_typewlan1[mime_typeX@\x00/proc/thread-self/attr/current\x00ppp1(,wlan0\x00changehat user\x00\x00/proc/thread-s\x00\x00\x00\x00attr/current\x00'], 0xffffff00) 01:24:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 251.792860][ T26] audit: type=1400 audit(1568510648.935:39): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=9363 comm="syz-executor.5" 01:24:09 executing program 1: r0 = socket(0x11, 0x4003, 0x0) sendto$unix(r0, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357a859fe35016fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3e000057699a1f132e27acb5d602000d7d026ba8af63ff37282118e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c8936a00f90006ee01be657aea8c500000002000000000900030000f0bc8cd0982dc9ea31b3a6413df0ecb84c85ba2400"/177, 0xb1, 0x0, 0x0, 0x0) 01:24:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0x5, 0x0, &(0x7f00000001c0)) 01:24:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x433, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) memfd_create(&(0x7f0000000240)='\xfaN\x069&_\x86\xef6\xf9\xa4s\xbcuW\x90\xf8\xba\xb1\x1av\xa5v\a', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RCLUNK(r1, &(0x7f0000000000)={0x7}, 0x7) fallocate(r1, 0x0, 0x0, 0x2000402) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 01:24:09 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 01:24:09 executing program 0: r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x4d78b4d3) 01:24:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@wsync='wsync'}]}) 01:24:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) [ 252.301462][ T9390] XFS (loop1): Invalid superblock magic number 01:24:10 executing program 1: 01:24:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xba, &(0x7f00000001c0)=""/186, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), 0x1}, 0x70) 01:24:10 executing program 3: 01:24:10 executing program 0: 01:24:10 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 01:24:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf64(r0, &(0x7f0000001340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [], "", [[], [], [], []]}, 0x440) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac610ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 01:24:10 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xc000, 0x0) 01:24:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 01:24:10 executing program 2: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)) 01:24:10 executing program 5: 01:24:10 executing program 1: 01:24:10 executing program 1: 01:24:10 executing program 5: 01:24:10 executing program 0: 01:24:10 executing program 2: 01:24:10 executing program 4: 01:24:11 executing program 4: 01:24:11 executing program 1: 01:24:11 executing program 5: 01:24:11 executing program 2: 01:24:11 executing program 0: 01:24:11 executing program 3: 01:24:11 executing program 4: 01:24:11 executing program 1: 01:24:11 executing program 4: 01:24:11 executing program 5: 01:24:11 executing program 2: 01:24:11 executing program 0: 01:24:11 executing program 3: 01:24:11 executing program 5: 01:24:11 executing program 2: 01:24:11 executing program 1: 01:24:11 executing program 0: 01:24:11 executing program 4: 01:24:11 executing program 2: 01:24:11 executing program 0: 01:24:11 executing program 3: 01:24:12 executing program 5: 01:24:12 executing program 4: 01:24:12 executing program 1: 01:24:12 executing program 2: 01:24:12 executing program 3: 01:24:12 executing program 0: 01:24:12 executing program 4: 01:24:12 executing program 1: 01:24:12 executing program 5: 01:24:12 executing program 3: 01:24:12 executing program 0: 01:24:12 executing program 2: 01:24:12 executing program 4: 01:24:12 executing program 1: 01:24:12 executing program 5: 01:24:12 executing program 3: 01:24:12 executing program 0: 01:24:12 executing program 2: 01:24:12 executing program 4: 01:24:12 executing program 1: 01:24:12 executing program 5: 01:24:12 executing program 0: 01:24:12 executing program 3: 01:24:12 executing program 2: 01:24:12 executing program 4: 01:24:13 executing program 5: 01:24:13 executing program 1: 01:24:13 executing program 2: 01:24:13 executing program 3: 01:24:13 executing program 0: 01:24:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000480)='/dev/audio\x00', 0x40000008846, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000400)={0x43}, 0x43) ioctl$int_in(r1, 0x800000c0045006, &(0x7f0000000000)) 01:24:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x5, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 01:24:13 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000001380)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}}, &(0x7f0000000080)) 01:24:13 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x4, &(0x7f0000000080)={0x0, 0x0, 0x2}) 01:24:13 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000500)=@proc, 0xc, 0x0}, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x32, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:24:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000380)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) [ 256.285534][ T9572] ------------[ cut here ]------------ [ 256.291202][ T9572] WARNING: CPU: 1 PID: 9572 at kernel/time/posix-cpu-timers.c:401 posix_cpu_timer_del+0x2f0/0x3b0 [ 256.301833][ T9572] Kernel panic - not syncing: panic_on_warn set ... [ 256.308424][ T9572] CPU: 1 PID: 9572 Comm: syz-executor.1 Not tainted 5.3.0-rc6-next-20190830 #75 [ 256.317435][ T9572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.327489][ T9572] Call Trace: [ 256.330864][ T9572] dump_stack+0x172/0x1f0 01:24:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00\x00\x00\x01\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="020000000000000000000000fffffdfd000000000000000002"]}) 01:24:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001000090568fe07f02a0000000100ff0722000000450001070300001419001a00120002000d0001000a002500"/57, 0x39}], 0x1) [ 256.335203][ T9572] ? posix_cpu_timer_del+0x2e0/0x3b0 [ 256.340490][ T9572] panic+0x2dc/0x755 [ 256.344399][ T9572] ? add_taint.cold+0x16/0x16 [ 256.349087][ T9572] ? printk+0xba/0xed [ 256.353071][ T9572] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 256.358536][ T9572] ? __warn.cold+0x14/0x3c [ 256.362954][ T9572] ? __warn+0xd9/0x1d0 [ 256.366109][ T3890] kobject: 'loop5' (00000000bb8b7240): kobject_uevent_env [ 256.367023][ T9572] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 256.379491][ T9572] __warn.cold+0x2f/0x3c 01:24:13 executing program 2: r0 = gettid() get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) [ 256.380821][ T3890] kobject: 'loop5' (00000000bb8b7240): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 256.383734][ T9572] ? report_bug.cold+0x63/0xad [ 256.383753][ T9572] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 256.383765][ T9572] report_bug+0x289/0x300 [ 256.383785][ T9572] do_error_trap+0x11b/0x200 [ 256.412822][ T9572] do_invalid_op+0x37/0x50 [ 256.417242][ T9572] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 256.422627][ T9572] invalid_op+0x23/0x30 [ 256.426786][ T9572] RIP: 0010:posix_cpu_timer_del+0x2f0/0x3b0 01:24:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="1f0000000000000007000000050001000000e7fc4b0900000000000000b7871001000000000000c446002560b7"]) 01:24:13 executing program 5: r0 = socket(0x10, 0x4000000000000002, 0xc) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) [ 256.432786][ T9572] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 83 bb c8 00 00 00 00 74 16 e8 00 58 0d 00 <0f> 0b e9 87 fe ff ff e8 c4 38 48 00 e9 dd fd ff ff e8 ea 57 0d 00 [ 256.452394][ T9572] RSP: 0018:ffff88805c297a30 EFLAGS: 00010093 [ 256.458550][ T9572] RAX: ffff8880556cc400 RBX: ffff88809f554e60 RCX: 1ffff1100aad9992 [ 256.466530][ T9572] RDX: 0000000000000000 RSI: ffffffff8164fe10 RDI: ffff88809f554f28 [ 256.474501][ T9572] RBP: ffff88805c297ac0 R08: 0000000000000002 R09: ffff8880556ccc98 [ 256.482481][ T9572] R10: fffffbfff138aef8 R11: ffffffff89c577c7 R12: ffff888060a9c4c0 [ 256.490498][ T9572] R13: 1ffff1100b852f47 R14: ffff88805c297a98 R15: ffff88809f554eb8 [ 256.498492][ T9572] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 256.503777][ T9572] ? lock_acquire+0x190/0x410 [ 256.508440][ T9572] ? thread_cpu_clock_getres+0x90/0x90 [ 256.513888][ T9572] ? thread_cpu_clock_getres+0x90/0x90 [ 256.519326][ T9572] exit_itimers+0xdb/0x2e0 [ 256.523734][ T9572] do_exit+0x1980/0x2e60 [ 256.527959][ T9572] ? get_signal+0x392/0x2500 [ 256.532615][ T9572] ? find_held_lock+0x35/0x130 [ 256.537359][ T9572] ? get_signal+0x392/0x2500 [ 256.541929][ T9572] ? mm_update_next_owner+0x640/0x640 [ 256.547295][ T9572] ? lock_downgrade+0x920/0x920 [ 256.552127][ T9572] ? _raw_spin_unlock_irq+0x28/0x90 [ 256.557304][ T9572] ? get_signal+0x392/0x2500 [ 256.561886][ T9572] ? _raw_spin_unlock_irq+0x28/0x90 [ 256.567068][ T9572] do_group_exit+0x135/0x360 [ 256.571643][ T9572] get_signal+0x47c/0x2500 [ 256.576042][ T9572] ? lock_downgrade+0x920/0x920 [ 256.580881][ T9572] do_signal+0x87/0x1700 [ 256.585105][ T9572] ? __kasan_check_read+0x11/0x20 [ 256.590109][ T9572] ? _copy_to_user+0x118/0x160 [ 256.594855][ T9572] ? setup_sigcontext+0x7d0/0x7d0 [ 256.599871][ T9572] ? exit_to_usermode_loop+0x43/0x380 [ 256.605238][ T9572] ? do_syscall_64+0x65f/0x760 [ 256.609995][ T9572] ? exit_to_usermode_loop+0x43/0x380 [ 256.615375][ T9572] ? lockdep_hardirqs_on+0x418/0x5d0 [ 256.620640][ T9572] ? trace_hardirqs_on+0x67/0x240 [ 256.625650][ T9572] exit_to_usermode_loop+0x286/0x380 [ 256.630916][ T9572] do_syscall_64+0x65f/0x760 [ 256.635509][ T9572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.641379][ T9572] RIP: 0033:0x4598e9 [ 256.645344][ T9572] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.664926][ T9572] RSP: 002b:00007fca35332cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 256.673326][ T9572] RAX: fffffffffffffe00 RBX: 000000000075bfd0 RCX: 00000000004598e9 [ 256.681278][ T9572] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 256.689230][ T9572] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 256.697180][ T9572] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 256.705152][ T9572] R13: 00007ffffb67885f R14: 00007fca353339c0 R15: 000000000075bfd4 [ 256.714861][ T9572] Kernel Offset: disabled [ 256.719258][ T9572] Rebooting in 86400 seconds..