[info] Using makefile-style concurrent boot in runlevel 2. [ 54.048626][ T27] audit: type=1800 audit(1577755419.453:21): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 54.076527][ T27] audit: type=1800 audit(1577755419.453:22): pid=7670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.175' (ECDSA) to the list of known hosts. 2019/12/31 01:23:52 fuzzer started 2019/12/31 01:23:54 dialing manager at 10.128.0.105:34777 2019/12/31 01:23:54 syscalls: 2695 2019/12/31 01:23:54 code coverage: enabled 2019/12/31 01:23:54 comparison tracing: enabled 2019/12/31 01:23:54 extra coverage: enabled 2019/12/31 01:23:54 setuid sandbox: enabled 2019/12/31 01:23:54 namespace sandbox: enabled 2019/12/31 01:23:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/31 01:23:54 fault injection: enabled 2019/12/31 01:23:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/31 01:23:54 net packet injection: enabled 2019/12/31 01:23:54 net device setup: enabled 2019/12/31 01:23:54 concurrency sanitizer: enabled 2019/12/31 01:23:54 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 76.871148][ T7835] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/31 01:24:05 adding functions to KCSAN blacklist: 'commit_echoes' 'fsnotify' 'rcu_gp_fqs_check_wake' 'audit_log_start' 'dd_has_work' 'mod_timer' 'shmem_add_to_page_cache' 'pipe_double_lock' 'iomap_dio_bio_actor' 'ext4_has_free_clusters' 'blk_mq_dispatch_rq_list' 'mm_update_next_owner' 'ext4_ext_insert_extent' 'n_tty_receive_buf_common' 'process_srcu' 'rcu_gp_fqs_loop' 'unix_release_sock' 'run_timer_softirq' 'do_nanosleep' 'snd_seq_prioq_cell_out' '__wb_update_bandwidth' 'do_try_to_free_pages' 'shmem_getpage_gfp' '__hrtimer_run_queues' '__ext4_new_inode' 'pcpu_alloc' 'ext4_mark_iloc_dirty' 'ext4_mb_good_group' 'find_next_bit' 'do_signal_stop' 'd_instantiate_new' 'shmem_file_read_iter' 'tick_nohz_idle_stop_tick' '__mark_inode_dirty' 'generic_fillattr' 'ext4_nonda_switch' 'queue_access_lock' 'pid_update_inode' 'snd_seq_check_queue' 'kcm_rfree' 'wbt_done' 'blk_mq_get_request' 'timer_clear_idle' 'ep_poll' 'ext4_free_inodes_count' '__lru_cache_add' 'kauditd_thread' 'echo_char' 'iput' 'fasync_remove_entry' 'poll_schedule_timeout' 'ktime_get_real_seconds' 'ext4_free_inode' '__delete_from_page_cache' 'tick_sched_do_timer' 'generic_write_end' 'tick_do_update_jiffies64' '__snd_rawmidi_transmit_ack' 'del_timer' 'generic_update_time' 'tomoyo_supervisor' 'lruvec_lru_size' 'add_timer_on' 'blk_stat_add' 'sit_tunnel_xmit' 'wbt_issue' 'copy_process' 'find_get_pages_range_tag' 'add_timer' 'vm_area_dup' 'atime_needs_update' 'list_lru_count_one' 'xas_find_marked' 'blk_mq_sched_dispatch_requests' 'taskstats_exit' 01:28:12 executing program 0: syz_open_dev$ndb(&(0x7f0000000c80)='/dev/nbd#\x00', 0x0, 0x40) 01:28:12 executing program 1: io_setup(0x0, &(0x7f0000000340)) [ 327.512364][ T7839] IPVS: ftp: loaded support on port[0] = 21 [ 327.633006][ T7839] chnl_net:caif_netlink_parms(): no params data found [ 327.691936][ T7839] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.711651][ T7839] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.720371][ T7839] device bridge_slave_0 entered promiscuous mode [ 327.732694][ T7842] IPVS: ftp: loaded support on port[0] = 21 01:28:13 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x0, 0x0) accept$unix(r0, 0x0, 0x0) [ 327.739558][ T7839] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.746656][ T7839] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.754522][ T7839] device bridge_slave_1 entered promiscuous mode [ 327.798129][ T7839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 327.822359][ T7839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 327.874141][ T7839] team0: Port device team_slave_0 added [ 327.890585][ T7842] chnl_net:caif_netlink_parms(): no params data found [ 327.901185][ T7839] team0: Port device team_slave_1 added [ 327.978544][ T7839] device hsr_slave_0 entered promiscuous mode 01:28:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000200)) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000000c0)=0x500, 0x8080fffffffe) [ 328.026526][ T7839] device hsr_slave_1 entered promiscuous mode [ 328.108900][ T7842] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.115980][ T7842] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.137837][ T7842] device bridge_slave_0 entered promiscuous mode [ 328.150972][ T7847] IPVS: ftp: loaded support on port[0] = 21 [ 328.161217][ T7839] netdevsim netdevsim0 netdevsim0: renamed from eth0 01:28:13 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) ppoll(&(0x7f0000000180)=[{r0, 0x4}], 0x1, 0x0, 0x0, 0x0) [ 328.218631][ T7842] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.225780][ T7842] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.235240][ T7842] device bridge_slave_1 entered promiscuous mode [ 328.247919][ T7839] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 328.258719][ T7849] IPVS: ftp: loaded support on port[0] = 21 [ 328.328324][ T7839] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 328.409873][ T7839] netdevsim netdevsim0 netdevsim3: renamed from eth3 01:28:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0) [ 328.484811][ T7853] IPVS: ftp: loaded support on port[0] = 21 [ 328.520399][ T7842] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 328.533925][ T7842] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.558710][ T7842] team0: Port device team_slave_0 added [ 328.565378][ T7842] team0: Port device team_slave_1 added [ 328.648250][ T7842] device hsr_slave_0 entered promiscuous mode [ 328.716511][ T7842] device hsr_slave_1 entered promiscuous mode [ 328.776293][ T7842] debugfs: Directory 'hsr0' with parent '/' already present! [ 328.792209][ T7839] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.799287][ T7839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.806601][ T7839] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.813674][ T7839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.829602][ T7850] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.837378][ T7850] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.939480][ T7847] chnl_net:caif_netlink_parms(): no params data found [ 328.948382][ T7842] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 328.989088][ T7842] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 328.994375][ T7855] IPVS: ftp: loaded support on port[0] = 21 [ 329.018056][ T7842] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 329.068526][ T7842] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 329.205899][ T7853] chnl_net:caif_netlink_parms(): no params data found [ 329.243820][ T7849] chnl_net:caif_netlink_parms(): no params data found [ 329.271330][ T7847] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.278573][ T7847] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.287746][ T7847] device bridge_slave_0 entered promiscuous mode [ 329.297032][ T7847] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.304087][ T7847] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.313548][ T7847] device bridge_slave_1 entered promiscuous mode [ 329.335119][ T7847] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.350925][ T7853] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.358175][ T7853] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.366091][ T7853] device bridge_slave_0 entered promiscuous mode [ 329.375796][ T7853] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.383053][ T7853] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.390795][ T7853] device bridge_slave_1 entered promiscuous mode [ 329.398604][ T7847] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.421637][ T7847] team0: Port device team_slave_0 added [ 329.429001][ T7847] team0: Port device team_slave_1 added [ 329.481368][ T7853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.500830][ T7849] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.508073][ T7849] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.515731][ T7849] device bridge_slave_0 entered promiscuous mode [ 329.578744][ T7847] device hsr_slave_0 entered promiscuous mode [ 329.636659][ T7847] device hsr_slave_1 entered promiscuous mode [ 329.696362][ T7847] debugfs: Directory 'hsr0' with parent '/' already present! [ 329.704919][ T7853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.718439][ T7849] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.725474][ T7849] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.733330][ T7849] device bridge_slave_1 entered promiscuous mode [ 329.742088][ T7839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.760207][ T7855] chnl_net:caif_netlink_parms(): no params data found [ 329.792497][ T7853] team0: Port device team_slave_0 added [ 329.804809][ T7849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.818791][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.826633][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.837894][ T7839] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.851195][ T7853] team0: Port device team_slave_1 added [ 329.862251][ T7849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.885760][ T7849] team0: Port device team_slave_0 added [ 329.923849][ T7849] team0: Port device team_slave_1 added [ 329.929779][ T7855] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.937488][ T7855] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.945088][ T7855] device bridge_slave_0 entered promiscuous mode [ 329.952372][ T7847] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 330.009274][ T7847] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 330.068388][ T7847] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 330.158812][ T7853] device hsr_slave_0 entered promiscuous mode [ 330.196671][ T7853] device hsr_slave_1 entered promiscuous mode [ 330.246323][ T7853] debugfs: Directory 'hsr0' with parent '/' already present! [ 330.254683][ T7855] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.261890][ T7855] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.269800][ T7855] device bridge_slave_1 entered promiscuous mode [ 330.291974][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 330.300842][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.309536][ T7852] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.316590][ T7852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.324233][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 330.333084][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.341569][ T7852] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.348650][ T7852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.363598][ T7842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.371201][ T7847] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 330.435851][ T7855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 330.447654][ T7855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 330.518020][ T7849] device hsr_slave_0 entered promiscuous mode [ 330.566566][ T7849] device hsr_slave_1 entered promiscuous mode [ 330.616365][ T7849] debugfs: Directory 'hsr0' with parent '/' already present! [ 330.644226][ T7842] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.651968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 330.663429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 330.672479][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 330.680254][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.703363][ T7849] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 330.739503][ T7849] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 330.787597][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 330.796387][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 330.804940][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 330.813570][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 330.826258][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 330.834610][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.843240][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 330.867496][ T7855] team0: Port device team_slave_0 added [ 330.873356][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 330.882099][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.894419][ T7849] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 330.959032][ T7853] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 330.999914][ T7855] team0: Port device team_slave_1 added [ 331.007025][ T7839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.026814][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.035618][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.044068][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.051097][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.059184][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.067870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.076074][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.083147][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.090911][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.105645][ T7849] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 331.148331][ T7853] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 331.209342][ T7853] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 331.258789][ T7853] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 331.300570][ T7847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.307684][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.319301][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.328217][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.337455][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.347472][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.355762][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.364946][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.438867][ T7855] device hsr_slave_0 entered promiscuous mode [ 331.496702][ T7855] device hsr_slave_1 entered promiscuous mode [ 331.536683][ T7855] debugfs: Directory 'hsr0' with parent '/' already present! [ 331.548977][ T7842] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 331.559794][ T7842] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 331.575172][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 331.585916][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 331.593340][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.601779][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.610200][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.618407][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.627344][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.658396][ T7839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 331.666967][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.674957][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.682841][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 331.690494][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 331.700004][ T7847] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.710683][ T7842] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 331.745994][ T7855] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 331.781465][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.791107][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.799541][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.806598][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.814440][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.823166][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.831441][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.838536][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.846353][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.855110][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.865273][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.884573][ T7855] netdevsim netdevsim5 netdevsim1: renamed from eth1 01:28:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f45f1af4c4600c3ff05010000000000000000000600fffffffff50100003800000000fbc8"], 0x25) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000020000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 331.938330][ T7855] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 331.981434][ T7849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.999186][ T7869] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 332.003534][ T7847] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 332.027035][ T7847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 332.045592][ T7855] netdevsim netdevsim5 netdevsim3: renamed from eth3 01:28:17 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000080), 0x4) [ 332.113481][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.129111][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.147299][ C1] hrtimer: interrupt took 33921 ns [ 332.149475][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.165954][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.177816][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.197783][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.209971][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.219351][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.230168][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 332.238657][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 01:28:17 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c595be66d044ed04b813dad4a4211"], 0x40) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0x0, 0x7, 0x0, 0x7fffffff, 'syz1\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x40}, &(0x7f0000000580)=0xe259, &(0x7f00000005c0)=0x2, 0x5, 0x4, 0x8, 0x1, 0x0, 0x8}}], 0x58, 0x8098}, 0x4000081) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x1f, 0x20, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) [ 332.262751][ T7847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 332.282969][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.293979][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.303411][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 01:28:17 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0xc4c85513, &(0x7f0000000080)) [ 332.329202][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.339759][ T7849] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.365857][ T7853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.394161][ T7853] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.409360][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.418419][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.426129][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 01:28:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000140)=@in={0x10}, 0x10) [ 332.438145][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.448732][ T7843] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.455814][ T7843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.500204][ T7853] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 332.514426][ T7853] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 332.536783][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 01:28:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000006980)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}}, 0x5c) [ 332.544900][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.561528][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.573131][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.580207][ T7850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.591115][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 01:28:18 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000100)) [ 332.605784][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.618262][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.628963][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.639135][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.649940][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.659321][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.666435][ T7850] bridge0: port 1(bridge_slave_0) entered forwarding state 01:28:18 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3f}]}) [ 332.699277][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.719695][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.732075][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.739170][ T7850] bridge0: port 2(bridge_slave_1) entered forwarding state 01:28:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000640)={"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"}) socketpair(0x0, 0xa, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) [ 332.750366][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 332.759918][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.769489][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.778305][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.787315][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.795957][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.805037][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.813849][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.822558][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.831503][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.872688][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.888633][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.907131][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.915679][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.935492][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.944797][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.953558][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.962120][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.979189][ T7855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.989739][ T7849] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 333.001407][ T7849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 333.012021][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 333.024161][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 333.031958][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.040909][ T7843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.055230][ T7855] 8021q: adding VLAN 0 to HW filter on device team0 [ 333.065395][ T7853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.083668][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.092480][ T7850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.120689][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.129595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.138123][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.145135][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.153132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.161792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.170494][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.177566][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.185195][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 333.194042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 333.203000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 333.210455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 333.217953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 333.226833][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 333.237311][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.245468][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 333.253872][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 333.262608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 333.273670][ T7849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.285068][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.293941][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.312475][ T7855] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 333.324190][ T7855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 333.336785][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.345050][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.367062][ T7855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 333.383505][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 333.399091][ T7852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 333.632132][ T7928] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 333.641069][ T7928] FAT-fs (loop3): Filesystem has been set read-only [ 333.648585][ T7928] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000020) 01:28:19 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000200)) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000000c0)=0x500, 0x8080fffffffe) 01:28:19 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 01:28:19 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001400)=0x14) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0x18, &(0x7f0000000140)=@assoc_value={r2}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r2, 0xfc}, 0x8) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) setuid(0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9010000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r5, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x639e}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20}, 0x110) getpeername$packet(r4, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 01:28:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000cc0)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 01:28:19 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c595be66d044ed04b813dad4a4211"], 0x40) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0x0, 0x7, 0x0, 0x7fffffff, 'syz1\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x40}, &(0x7f0000000580)=0xe259, &(0x7f00000005c0)=0x2, 0x5, 0x4, 0x8, 0x1, 0x0, 0x8}}], 0x58, 0x8098}, 0x4000081) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x1f, 0x20, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 01:28:19 executing program 0: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="e2a466aa0e8d09958cfb6923c2d9ea10ccae8f7987fd3bf67ef3b63399a1e2f7e70f0600416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c592623ce464ed04b81"], 0x4a) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c595be66d044ed04b813dad4a4211"], 0x40) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 'syz1\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000480)=""/13, 0xd}, {&(0x7f00000004c0)=""/113, 0x71}], 0x2, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2}, 0x0, &(0x7f00000005c0)=0x2, 0x5, 0x4, 0x8, 0x1, 0x0, 0x8}}], 0x58, 0x8098}, 0x4000081) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x1f, 0x0, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) 01:28:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000200)) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000000c0)=0x500, 0x8080fffffffe) 01:28:19 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) 01:28:19 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c595be66d044ed04b813dad4a4211"], 0x40) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0x0, 0x7, 0x0, 0x7fffffff, 'syz1\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x40}, &(0x7f0000000580)=0xe259, &(0x7f00000005c0)=0x2, 0x5, 0x4, 0x8, 0x1, 0x0, 0x8}}], 0x58, 0x8098}, 0x4000081) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x1f, 0x20, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 01:28:19 executing program 5: openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0x6, &(0x7f00000001c0)="672c2e08165b865395c39a50584cb73686e32220552dd420abb5f86efff311749136f605e64fc80caa91e1a6ede26e21d068bd00a8b29f299b1ae773d6d40265d0a3cf470463c2481ea1c25cc75812ee5a3676937813974fc018c77a50411bf3fe6df8473a052114f82960703a86daad1ad5f77b474b14f82e377eecf2c611332a19c812f048cd271cc4693615cb73d5cc8b852c3eb57fe891de8847279d9941a03b661935755595d0"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)) syz_open_pts(r1, 0x0) 01:28:19 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c595be66d044ed04b813dad4a4211"], 0x40) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0x0, 0x7, 0x0, 0x7fffffff, 'syz1\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x40}, &(0x7f0000000580)=0xe259, &(0x7f00000005c0)=0x2, 0x5, 0x4, 0x8, 0x1, 0x0, 0x8}}], 0x58, 0x8098}, 0x4000081) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x1f, 0x20, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 01:28:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4010ae68, &(0x7f00000001c0)={0x0, 0x0}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) [ 334.149353][ T7961] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 334.161549][ T7961] FAT-fs (loop4): Filesystem has been set read-only [ 334.169390][ T7961] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000020) [ 334.225700][ T7970] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 16) [ 334.257910][ T7970] FAT-fs (loop3): Filesystem has been set read-only [ 334.295920][ T7970] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000020) 01:28:19 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000006500), &(0x7f0000006540)=0x8) 01:28:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x40000, 0xfff) fallocate(r0, 0x0, 0x0, 0x10001) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 01:28:19 executing program 5: socket$nl_route(0x10, 0x3, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = creat(0x0, 0x0) io_setup(0x0, &(0x7f00000004c0)) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x4000) io_setup(0x1ff, &(0x7f00000004c0)) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) 01:28:19 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$midi(r0, &(0x7f0000000000)="c2", 0x1) lseek(r0, 0x0, 0x4) 01:28:19 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001400)=0x14) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0x18, &(0x7f0000000140)=@assoc_value={r2}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r2, 0xfc}, 0x8) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) setuid(0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9010000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r5, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x639e}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20}, 0x110) getpeername$packet(r4, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 01:28:19 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001400)=0x14) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0x18, &(0x7f0000000140)=@assoc_value={r2}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r2, 0xfc}, 0x8) socket$can_bcm(0x1d, 0x2, 0x2) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) setuid(0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9010000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r5, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x639e}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r6}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20}, 0x110) getpeername$packet(r4, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 01:28:20 executing program 4: r0 = socket(0x4000000002c, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 01:28:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 01:28:20 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000040)={{0x5, 0x0, 0x0, 0x0, 'syz1\x00'}}) 01:28:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:28:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x14) 01:28:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001008, 0x0) 01:28:20 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9ed3) 01:28:20 executing program 1: socketpair(0xa, 0x3, 0x5, &(0x7f0000000240)) 01:28:20 executing program 3: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="e2a466aa0e8d09958cfb6923c2d9ea10ccae8f7987fd3bf67ef3b63399a1e2f7e70f0600416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c592623ce464ed04b81"], 0x4a) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98"], 0x30) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000380)={r0, r1, 0x0, 0x0, 0x0, 0x3, 0x3, 0x2, 0x3, 0x7, 0x0, 0x7fffffff, 'syz1\x00'}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000480)=""/13, 0xd}, {&(0x7f00000004c0)=""/113, 0x71}], 0x2, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2}, 0x0, &(0x7f00000005c0), 0x5, 0x4, 0x8, 0x1, 0x0, 0x8}}], 0x58, 0x8098}, 0x4000081) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x0, 0x20, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r4, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) 01:28:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000600"}}}}, 0x90) 01:28:20 executing program 4: sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) 01:28:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) flock(r0, 0x0) 01:28:20 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x40, 0x0) 01:28:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x2000}, 0x20) fchmod(0xffffffffffffffff, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 01:28:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000380), 0x1000000020000) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000180)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}}) 01:28:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000600"}}}}, 0x90) 01:28:20 executing program 3: socket$rxrpc(0x21, 0x2, 0xa) socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449"], 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 01:28:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0200cb76ea7211439a321f589f32be513a25de0b608088ed10ecd8f255705addfd40df1c69c799b0f81a11ab4971f9166617a497a18603807eeab93d20ca8f83d9cced9e34e7d843976e821bd4c9e34997ea210181451b143521435cb49840b0f61274420a5d97"], 0x48}}, 0x0) 01:28:21 executing program 5: io_uring_setup(0x19a, &(0x7f0000000000)={0x0, 0x0, 0x6}) 01:28:21 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) 01:28:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0, 0x49) getsockopt$rose(0xffffffffffffffff, 0x104, 0x3, 0x0, &(0x7f0000000080)) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) r5 = accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r6, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r5, &(0x7f0000000340), 0xfdef}]) io_cancel(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a1", 0xce, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:21 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000001a40)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0xc0189436, &(0x7f0000000080)=""/188) 01:28:21 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x540000, 0x0) 01:28:21 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000540)={0x0, 0x0}) 01:28:21 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socket$inet_udp(0x2, 0x2, 0x0) socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000680), 0x143) bind$xdp(0xffffffffffffffff, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 01:28:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xfb, 0x0, 0x0) 01:28:21 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r0, 0xfffffffffffffffe, 0x0) 01:28:21 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0x2, &(0x7f0000000000)) [ 336.206622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.212725][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:28:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x14}, 0x3c) 01:28:21 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0xc0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 01:28:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @empty={[0x0, 0x0, 0x0, 0x4]}, @loopback, 0x0, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r1}) 01:28:21 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000800)={'bridge_slave_0\x00'}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000680)=0x2, 0x143) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x2000}, 0x20) fchmod(r1, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f00000000c0), 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xd) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 01:28:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0, 0x49) getsockopt$rose(0xffffffffffffffff, 0x104, 0x3, 0x0, &(0x7f0000000080)) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) r5 = accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r6, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r5, &(0x7f0000000340), 0xfdef}]) io_cancel(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a1", 0xce, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0, 0x49) getsockopt$rose(0xffffffffffffffff, 0x104, 0x3, 0x0, &(0x7f0000000080)) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) r5 = accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r6, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r5, &(0x7f0000000340), 0xfdef}]) io_cancel(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a1", 0xce, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0, 0x49) getsockopt$rose(0xffffffffffffffff, 0x104, 0x3, 0x0, &(0x7f0000000080)) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) r5 = accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r6, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r5, &(0x7f0000000340), 0xfdef}]) io_cancel(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a1", 0xce, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x0, 0x49) getsockopt$rose(0xffffffffffffffff, 0x104, 0x3, 0x0, &(0x7f0000000080)) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) r5 = accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r6, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r5, &(0x7f0000000340), 0xfdef}]) io_cancel(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a1", 0xce, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x1, 0x2, 0x2d2, 0x40000000, 0x0, {}, {0x1, 0x8, 0x40, 0x1, 0x48, 0x0, "ea126e96"}, 0xfc, 0x1, @offset=0x9, 0x7fffffff}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="1c002900d3ca525d3b97f03e6acff3cc711a8ed927f22e50f32545722a1e37afbc8fd4e7f63b62b2287ec54db6"]) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 01:28:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) [ 336.766279][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.772095][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:28:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xf9) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000900)) [ 336.929940][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 336.929961][ T27] audit: type=1804 audit(1577755702.313:31): pid=8147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir032766478/syzkaller.RXkxQ7/8/bus" dev="sda1" ino=16567 res=1 01:28:22 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x180000) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x8, 0x0, 0x3}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 336.986909][ T27] audit: type=1804 audit(1577755702.373:32): pid=8152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir032766478/syzkaller.RXkxQ7/8/bus" dev="sda1" ino=16567 res=1 01:28:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x1000000020000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:28:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x1, 0x2, 0x2d2, 0x40000000, 0x0, {}, {0x1, 0x8, 0x40, 0x1, 0x48, 0x0, "ea126e96"}, 0xfc, 0x1, @offset=0x9, 0x7fffffff}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="1c002900d3ca525d3b97f03e6acff3cc711a8ed927f22e50f32545722a1e37afbc8fd4e7f63b62b2287ec54db6"]) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 01:28:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x1, 0x2, 0x2d2, 0x40000000, 0x0, {}, {0x1, 0x8, 0x40, 0x1, 0x48, 0x0, "ea126e96"}, 0xfc, 0x1, @offset=0x9, 0x7fffffff}) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="1c002900d3ca525d3b97f03e6acff3cc711a8ed927f22e50f32545722a1e37afbc8fd4e7f63b62b2287ec54db6"]) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 01:28:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) read$FUSE(r2, &(0x7f0000001240), 0xffffff7b) 01:28:22 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x5452, &(0x7f0000000080)={0xc2}) [ 337.400048][ T27] audit: type=1804 audit(1577755702.803:33): pid=8176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir147845064/syzkaller.ZC2jTF/15/file0/file0" dev="loop1" ino=25 res=1 01:28:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 01:28:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="e2a466aa0e8d09958cfb6923c2d9ea10ccae8f7987fd3bf67ef3b63399a1e2f7e70f0600416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c592623ce464ed04b813dad4a4211f3"], 0x3ff800) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b63399a1e2f7e70fc418416b608bcdac235d2b3f5506f24c093b9d53b7b06463b9a17f2f98fc6c595be66d044ed04b813dad4a4211f3"], 0x3ff800) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000380)={r1, r2, 0x7, 0x82, &(0x7f00000002c0)="4aa0af32da7f3d5a307d315b0bc35441caff3691e9bdb45a251ec70317e9692f1dd56085c1cbce7a6709279f1bfa7ef3e2016352d0524ed0ab4eca1834c910f260eadd81079cee82f9c754d83aee99850b264ebfbe846f73cdf9a415a56ec6d615377c9c862d5bb56a52b42727c5dfbcd86b1e86543569fd6cf91a7280b6fbaa97a3", 0x3, 0x3, 0x2, 0x3, 0x7, 0x0, 0x7fffffff, 'syz1\x00'}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x120000, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x82, 0x0) sendmsg$rds(r4, &(0x7f0000000680)={&(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000480)=""/13, 0xd}, {&(0x7f00000004c0)=""/113, 0x71}], 0x2, &(0x7f0000000600)=[@mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x40}, &(0x7f0000000580)=0xe259, &(0x7f00000005c0)=0x2, 0x5, 0x4, 0x8, 0x1, 0xe1, 0x8}}], 0x58, 0x8098}, 0x4000081) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000000), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x1, 0x1f, 0x20, 0x8, 0x0, "fe130b3c"}, 0x80000, 0x0, @fd, 0x3}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="e2a4668f7987fd3bf67ef3b6339999fb5735c6db40608087fb552b3f5506f2050000000000000038482a22ac2f98fc6c595be66d04000000000000000911f37f067cc4d30000000000000000960b8619fd21e11133641f52d179574908"], 0x3ff800) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) 01:28:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a195383b7acd52522de0fcbbc896", 0xdb, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x5, {{0xa, 0x4e21, 0x3, @rand_addr="af8dd825fb3e33eae9860c4ea87afb2f", 0x3}}, {{0xa, 0x4e22, 0x4, @local}}}, 0x108) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') [ 337.530113][ T27] audit: type=1804 audit(1577755702.833:34): pid=8183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir635959567/syzkaller.f2wQ4n/12/bus" dev="sda1" ino=16520 res=1 01:28:23 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ip6gre0\x00'}) [ 337.607324][ T27] audit: type=1804 audit(1577755702.843:35): pid=8171 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir032766478/syzkaller.RXkxQ7/9/bus" dev="sda1" ino=16570 res=1 01:28:23 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x180000) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x8, 0x0, 0x3}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:23 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x180000) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x8, 0x0, 0x3}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') [ 337.764043][ T27] audit: type=1804 audit(1577755702.843:36): pid=8173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir635959567/syzkaller.f2wQ4n/12/bus" dev="sda1" ino=16520 res=1 01:28:23 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x180000) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x8, 0x0, 0x3}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') [ 337.886256][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 337.892096][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:28:23 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x180000) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x8, 0x0, 0x3}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) semctl$IPC_RMID(0x0, 0x0, 0x14) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:23 executing program 4: getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000001400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xfc}, 0x8) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x800010) syz_genetlink_get_family_id$nbd(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) setuid(0x0) getpeername$packet(r3, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 01:28:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) recvmmsg(r2, &(0x7f0000008ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:28:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a195383b7acd52522de0fcbbc896", 0xdb, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x5, {{0xa, 0x4e21, 0x3, @rand_addr="af8dd825fb3e33eae9860c4ea87afb2f", 0x3}}, {{0xa, 0x4e22, 0x4, @local}}}, 0x108) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') 01:28:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file1\x00', 0x40, 0x49) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) getpgid(0xffffffffffffffff) accept$nfc_llcp(r0, &(0x7f0000000500), &(0x7f0000000000)=0x60) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x180000) accept4$alg(r4, 0x0, 0x0, 0xf05cf7484456a57e) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x400, 0xffffffffffffffff, &(0x7f0000000580)="c8abe053e4ae8200c4731a72284da60116f883172bae3aba8329bfe11c846846222ee6e1a78fd4067d89cb39353a8216f40a9e15bd0d1a4b32b4690fa86b0c0971c07b59d6305dbdff197b8ca9c11d032cde993d448919b490dd283270179796c9d491f5e4c4842cdeaa48c4588484a78d70aa424bf693441e8f0cad7297cd193a65d3bd23317282d5d4359f7599b62ae5e8605c28e83a0754d4832eff11fbaf939ecd8649388ab3f62110309bed04aee4ff9c8d0d90ae784efaffb081b1ee2b5a6f234032e62e940fa35f0af0a195383b7acd52522de0fcbbc896", 0xdb, 0x8, 0x0, 0x3, r0}, &(0x7f0000000680)) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f00000001c0)) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x5, {{0xa, 0x4e21, 0x3, @rand_addr="af8dd825fb3e33eae9860c4ea87afb2f", 0x3}}, {{0xa, 0x4e22, 0x4, @local}}}, 0x108) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') [ 338.286282][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 338.292109][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:28:23 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}, {r0, r1+10000000}}, 0x0) 01:28:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) 01:28:23 executing program 5: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "da2460fa4076226e6190bc31192a04de30fe4d"}) 01:28:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000380), 0x1000000020000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:28:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x4, 0x4) 01:28:24 executing program 4: getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000001400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xfc}, 0x8) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x800010) syz_genetlink_get_family_id$nbd(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) setuid(0x0) getpeername$packet(r3, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 01:28:24 executing program 5: getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000001400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xfc}, 0x8) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x800010) syz_genetlink_get_family_id$nbd(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) setuid(0x0) getpeername$packet(r3, &(0x7f0000000180), &(0x7f00000001c0)=0x14) 01:28:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x2, 0x2d2, 0x0, 0x0, {}, {0x0, 0x8, 0x40, 0x1, 0x48, 0x0, "ea126e96"}, 0x0, 0x1}) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 01:28:24 executing program 0: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) 01:28:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f45f1af4c4600c3ff05010000000000000000000600fffffffff50100003800000000fbc8090a9c03"], 0x29) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000000020000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000040)=0x2) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 338.909504][ T27] audit: type=1804 audit(1577755704.313:37): pid=8281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir032766478/syzkaller.RXkxQ7/13/bus" dev="sda1" ino=16569 res=1 [ 338.946306][ T27] audit: type=1804 audit(1577755704.313:38): pid=8279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir032766478/syzkaller.RXkxQ7/13/bus" dev="sda1" ino=16569 res=1 01:28:24 executing program 0: bind$ax25(0xffffffffffffffff, 0x0, 0x0) [ 339.016725][ T27] audit: type=1804 audit(1577755704.343:39): pid=8281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir032766478/syzkaller.RXkxQ7/13/bus" dev="sda1" ino=16569 res=1 01:28:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) open(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) syz_genetlink_get_family_id$SEG6(0x0) [ 339.068949][ T8267] ================================================================== [ 339.077110][ T8267] BUG: KCSAN: data-race in __blk_queue_split / bio_endio [ 339.084149][ T8267] [ 339.086482][ T8267] read to 0xffff888129594f14 of 2 bytes by interrupt on cpu 1: [ 339.094034][ T8267] bio_endio+0x3e/0x400 [ 339.098194][ T8267] blk_update_request+0x427/0x7b0 [ 339.103231][ T8267] scsi_end_request+0x6b/0x360 [ 339.108004][ T8267] scsi_io_completion+0x11d/0xc80 [ 339.113035][ T8267] scsi_finish_command+0x283/0x380 [ 339.118152][ T8267] scsi_softirq_done+0x259/0x280 [ 339.123092][ T8267] blk_done_softirq+0x1eb/0x250 [ 339.127945][ T8267] __do_softirq+0x115/0x33f [ 339.132449][ T8267] irq_exit+0xbb/0xe0 [ 339.136497][ T8267] do_IRQ+0x81/0x130 [ 339.140407][ T8267] ret_from_intr+0x0/0x21 [ 339.144750][ T8267] batadv_nc_process_nc_paths.part.0+0x7c/0x1d0 [ 339.150985][ T8267] batadv_nc_worker+0x359/0x390 [ 339.155837][ T8267] process_one_work+0x3d4/0x890 [ 339.160680][ T8267] worker_thread+0xa0/0x800 [ 339.165179][ T8267] kthread+0x1d4/0x200 [ 339.169253][ T8267] ret_from_fork+0x1f/0x30 [ 339.173735][ T8267] [ 339.176063][ T8267] write to 0xffff888129594f14 of 2 bytes by task 8267 on cpu 0: [ 339.183680][ T8267] __blk_queue_split+0x738/0xc40 [ 339.188603][ T8267] blk_mq_make_request+0x104/0xf60 [ 339.193698][ T8267] generic_make_request+0x196/0x700 [ 339.198878][ T8267] submit_bio+0x96/0x3c0 [ 339.203105][ T8267] iomap_dio_submit_bio.isra.0+0xfc/0x120 [ 339.208808][ T8267] iomap_dio_bio_actor+0x40a/0x960 [ 339.213899][ T8267] iomap_dio_actor+0x87/0x3a0 [ 339.218554][ T8267] iomap_apply+0x20d/0x6a0 [ 339.223057][ T8267] iomap_dio_rw+0x67e/0x9a0 [ 339.227547][ T8267] ext4_file_write_iter+0xc38/0xd40 [ 339.232729][ T8267] new_sync_write+0x388/0x4a0 [ 339.237388][ T8267] __vfs_write+0xb1/0xc0 [ 339.241655][ T8267] vfs_write+0x18a/0x390 [ 339.245881][ T8267] ksys_write+0xd5/0x1b0 [ 339.250108][ T8267] __x64_sys_write+0x4c/0x60 [ 339.254685][ T8267] do_syscall_64+0xcc/0x3a0 [ 339.259190][ T8267] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 339.265055][ T8267] [ 339.267361][ T8267] Reported by Kernel Concurrency Sanitizer on: [ 339.273511][ T8267] CPU: 0 PID: 8267 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 339.282070][ T8267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.292104][ T8267] ================================================================== [ 339.300153][ T8267] Kernel panic - not syncing: panic_on_warn set ... [ 339.306722][ T8267] CPU: 0 PID: 8267 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 339.315289][ T8267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.325327][ T8267] Call Trace: [ 339.328607][ T8267] dump_stack+0x11d/0x181 [ 339.332924][ T8267] panic+0x210/0x640 [ 339.336805][ T8267] ? vprintk_func+0x8d/0x140 [ 339.341393][ T8267] kcsan_report.cold+0xc/0xd [ 339.345983][ T8267] kcsan_setup_watchpoint+0x3fe/0x460 [ 339.351340][ T8267] __tsan_unaligned_write2+0xc7/0x110 [ 339.356704][ T8267] __blk_queue_split+0x738/0xc40 [ 339.361636][ T8267] blk_mq_make_request+0x104/0xf60 [ 339.366734][ T8267] ? blk_queue_enter+0x532/0x570 [ 339.371661][ T8267] generic_make_request+0x196/0x700 [ 339.376894][ T8267] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 339.382597][ T8267] submit_bio+0x96/0x3c0 [ 339.386824][ T8267] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 339.393048][ T8267] ? bio_iov_iter_get_pages+0x44a/0x5a0 [ 339.398579][ T8267] iomap_dio_submit_bio.isra.0+0xfc/0x120 [ 339.404282][ T8267] iomap_dio_bio_actor+0x40a/0x960 [ 339.409377][ T8267] iomap_dio_actor+0x87/0x3a0 [ 339.414039][ T8267] iomap_apply+0x20d/0x6a0 [ 339.418441][ T8267] ? iomap_dio_bio_actor+0x960/0x960 [ 339.423714][ T8267] iomap_dio_rw+0x67e/0x9a0 [ 339.428199][ T8267] ? iomap_dio_bio_actor+0x960/0x960 [ 339.433488][ T8267] ext4_file_write_iter+0xc38/0xd40 [ 339.438671][ T8267] ? ext4_file_write_iter+0xc38/0xd40 [ 339.444034][ T8267] ? iov_iter_init+0xe2/0x120 [ 339.448698][ T8267] new_sync_write+0x388/0x4a0 [ 339.453359][ T8267] ? __rcu_read_unlock+0x66/0x3d0 [ 339.458371][ T8267] __vfs_write+0xb1/0xc0 [ 339.462598][ T8267] vfs_write+0x18a/0x390 [ 339.466834][ T8267] ksys_write+0xd5/0x1b0 [ 339.471071][ T8267] __x64_sys_write+0x4c/0x60 [ 339.475647][ T8267] do_syscall_64+0xcc/0x3a0 [ 339.480162][ T8267] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 339.486033][ T8267] RIP: 0033:0x45a919 [ 339.489914][ T8267] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.509515][ T8267] RSP: 002b:00007fa0e5753c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.517906][ T8267] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 339.525862][ T8267] RDX: 00000000003ff800 RSI: 0000000020000000 RDI: 0000000000000007 [ 339.533812][ T8267] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.541818][ T8267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0e57546d4 [ 339.549780][ T8267] R13: 00000000004cbe69 R14: 00000000004e5cc0 R15: 00000000ffffffff [ 339.558550][ T8267] Kernel Offset: disabled [ 339.562886][ T8267] Rebooting in 86400 seconds..