, 0x1, 0x7fff, 0x89, 0x81, 0x1, 0x0], &(0x7f0000000100)=[0x9, 0xe8, 0x800], &(0x7f0000000140)=[0x7, 0x9, 0x5, 0xff, 0x10001, 0x8, 0x8ed1, 0x4], 0x0, 0xffffffffffff0001}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) dup3(r4, r0, 0x0) [ 194.583288] audit: type=1804 audit(1607470582.853:12): pid=10247 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/12/file0" dev="sda1" ino=15819 res=1 [ 194.714049] block nbd0: shutting down sockets [ 194.770402] block nbd0: shutting down sockets [ 194.800265] audit: type=1804 audit(1607470583.953:13): pid=10259 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/12/file1/file0" dev="loop1" ino=6 res=1 23:36:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(r0, r1, 0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000100)=""/38, &(0x7f0000000140)=0x26) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="81100000000000002c00128009000100766c616e000000001c0002800600010000000000100004800c00010000000000ae3bffff08000500", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB], 0x5c}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r2}) r7 = socket(0x11, 0x800000003, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r9}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000600)={r9, 0xce, "026c205da2887282728938cb0d625175e4af0af193ea3c264e9ea4c23ed0a1a1f5bf43e49fcfe52903915656065dea89c7de831d3ef5f650192c0576e10382e21e2b829864829eb2eb5e3d6237e62abae4051d249480a4a8d30b59597e95a3e286717cf98eba971e620e4aa464a537acd905419f07b527860c3bab3d28f7ef64fcccada6ea42d0058dee05347ce8f271103f7fd6879dfa22d12e130ea9428fe3ea503e53671785cdd0502d76510f3b5c91c5bcb51c42b2d41972fe32fa8a5dcac30d828e9cf1830ff9ee1ec03af2"}, &(0x7f00000001c0)=0xd6) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x0, 0x80000000, 0x4, 0x0, 0x6, 0x0, 0x7f}, 0x1c) 23:36:24 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002e0, 0x1a4, 0x80000, &(0x7f0000000280)="b95b03b700030005439e40f086dd", 0x0, 0x1a4, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 195.077469] IPVS: sync thread started: state = BACKUP, mcast_ifn = gre0, syncid = 0, id = 0 [ 195.265167] audit: type=1804 audit(1607470584.973:14): pid=10295 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/13/file1/file0" dev="loop1" ino=7 res=1 [ 195.355732] sctp: [Deprecated]: syz-executor.4 (pid 10284) Use of struct sctp_assoc_value in delayed_ack socket option. [ 195.355732] Use struct sctp_sack_info instead 23:36:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socket$nl_route(0x10, 0x3, 0x0) pwritev2(r0, &(0x7f0000000700)=[{&(0x7f00000000c0)="df1aacab3affc71371101f24ba1656d96a64df0a510ab2f9aa9034db4f3e713b207fcdb3971f7093d0f0cba6cf979eda295e9220cb3246c3f96d03", 0x3b}, {&(0x7f00000003c0)="95d32c67d84af1f954672b35f341b125554cdd9b3a73edd11347e9df01c9071d410d2c16113a66", 0x27}, {&(0x7f0000000400)="b397d1d3c8aa06450623c6c23706c1d4c158dbc3fcbbdd8394012c74581e859bd952493e3893af402efdaba51235a4233e5d2091ede39035be0b2c3c7a6250275ebf216f3131327f62233b7dec96978a81b5029590da5eaa8507b22bbfd0d6725896c704517fc6074b0d5e41ca01bf133f6523fb78b638d599604f671ba1eba7b3b77464", 0x84}, {0x0}, {&(0x7f0000000580)="98", 0x1}, {&(0x7f00000005c0)}], 0x6, 0x3, 0x9, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x8f9f6608a6003f10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) wait4(0x0, 0x0, 0x8, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="6707000000000000000011000000080003000000000000000000", @ANYRES32=r3, @ANYBLOB], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5af, 0x43}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4004001) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) dup2(r4, r1) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={0x0}}, 0xc001) 23:36:25 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x3000)=nil, 0x3000}, 0x2}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000000c0)=""/155) 23:36:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'gre0\x00'}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)={0x18, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRESHEX=r2], 0xa8}, 0x1, 0x0, 0x0, 0x40084}, 0x8c1) socket$nl_route(0x10, 0x3, 0x0) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000040)=0x1) r4 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)=ANY=[]) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000180)=0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000500)=0x1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0xfffffffffffffed3, &(0x7f0000000680)}, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) 23:36:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @dev}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000180)) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206010100000000000000000000000005000400000000000500010006000000050005000a0000000d000300686173683a6e657400000000ffffffff00000000000000000c00078008000640000000"], 0x54}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) ptrace$setregs(0xd, 0x0, 0x1, &(0x7f0000000a00)="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") umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 195.965532] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 195.987045] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 195.995392] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 196.004133] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 196.021935] device bridge_slave_1 left promiscuous mode [ 196.027507] bridge0: port 2(bridge_slave_1) entered disabled state 23:36:25 executing program 0: prlimit64(0xffffffffffffffff, 0xe, &(0x7f0000000280)={0x7, 0x8f}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x118, r1, 0x288, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xfff8}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e1e}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x78}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private1={0xfc, 0x1, [], 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xbcd4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x400000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xba}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6d80000}]}, 0x118}, 0x1, 0x0, 0x0, 0x4040804}, 0x6d39764af4d9008f) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x1, 0x2, 0xffffff01, 0x0, 0x8000, 0x1000000000, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x0, 0x1, 0x0, 0x5, 0xfffffffd}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x0, 0x10041, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x6066f8b037950f63) ftruncate(r6, 0x800) lseek(r6, 0x0, 0x2) r7 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x8400fffffffa) [ 196.180228] device bridge_slave_0 left promiscuous mode [ 196.194825] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.265560] device veth1_macvtap left promiscuous mode [ 196.266298] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 196.276715] audit: type=1804 audit(1607470585.993:15): pid=10344 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/16/bus" dev="sda1" ino=15785 res=1 [ 196.326211] device veth0_macvtap left promiscuous mode [ 196.359489] device veth1_vlan left promiscuous mode [ 196.377374] device veth0_vlan left promiscuous mode [ 196.786885] device hsr_slave_1 left promiscuous mode [ 196.809076] device hsr_slave_0 left promiscuous mode [ 196.857574] team0 (unregistering): Port device team_slave_1 removed [ 196.885356] team0 (unregistering): Port device team_slave_0 removed [ 196.907036] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 196.919137] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 196.963251] bond0 (unregistering): Released all slaves [ 197.027849] audit: type=1804 audit(1607470586.753:16): pid=10351 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/16/bus" dev="sda1" ino=15785 res=1 [ 197.103050] audit: type=1804 audit(1607470586.833:17): pid=10355 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/16/bus" dev="sda1" ino=15785 res=1 [ 199.056180] IPVS: ftp: loaded support on port[0] = 21 [ 199.164157] chnl_net:caif_netlink_parms(): no params data found [ 199.223511] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.229954] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.237782] device bridge_slave_0 entered promiscuous mode [ 199.245239] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.252120] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.259448] device bridge_slave_1 entered promiscuous mode [ 199.279347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.288398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.307248] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 199.314741] team0: Port device team_slave_0 added [ 199.320230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 199.328347] team0: Port device team_slave_1 added [ 199.347591] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 199.354003] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.379306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 199.390743] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 199.397095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.422406] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 199.433435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 199.440941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 199.464110] device hsr_slave_0 entered promiscuous mode [ 199.469909] device hsr_slave_1 entered promiscuous mode [ 199.477546] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 199.485699] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 199.558592] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.565057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.571778] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.578181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.612508] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 199.618612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.627662] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 199.637331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.645521] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.652970] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.663385] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 199.669481] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.678345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.686465] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.692904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.702804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.710431] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.716902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.731588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.739800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.753263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.764793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.775755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.787342] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 199.793573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.800598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.814137] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 199.823104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.829894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.840889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.900408] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 199.912484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.943188] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 199.950351] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 199.958086] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 199.969081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.977815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.985151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.995999] device veth0_vlan entered promiscuous mode [ 200.006105] device veth1_vlan entered promiscuous mode [ 200.012332] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 200.020910] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 200.035445] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 200.045371] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 200.053315] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 200.060666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.070357] device veth0_macvtap entered promiscuous mode [ 200.076966] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 200.086378] device veth1_macvtap entered promiscuous mode [ 200.095895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 200.105437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 200.115582] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.125720] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.135239] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.145105] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.154665] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.164477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.173689] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.183543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.195441] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.202791] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 200.209841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.218424] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 200.228592] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.238924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.248670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.259730] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.268995] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.278845] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.288064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.298089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.308285] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 200.315329] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.323171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.331849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.526832] audit: type=1804 audit(1607470590.253:18): pid=10610 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/0/file1/file0" dev="loop3" ino=8 res=1 23:36:30 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) 23:36:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socket$nl_route(0x10, 0x3, 0x0) pwritev2(r0, &(0x7f0000000700)=[{&(0x7f00000000c0)="df1aacab3affc71371101f24ba1656d96a64df0a510ab2f9aa9034db4f3e713b207fcdb3971f7093d0f0cba6cf979eda295e9220cb3246c3f96d03", 0x3b}, {&(0x7f00000003c0)="95d32c67d84af1f954672b35f341b125554cdd9b3a73edd11347e9df01c9071d410d2c16113a66", 0x27}, {&(0x7f0000000400)="b397d1d3c8aa06450623c6c23706c1d4c158dbc3fcbbdd8394012c74581e859bd952493e3893af402efdaba51235a4233e5d2091ede39035be0b2c3c7a6250275ebf216f3131327f62233b7dec96978a81b5029590da5eaa8507b22bbfd0d6725896c704517fc6074b0d5e41ca01bf133f6523fb78b638d599604f671ba1eba7b3b77464", 0x84}, {0x0}, {&(0x7f0000000580)="98", 0x1}, {&(0x7f00000005c0)}], 0x6, 0x3, 0x9, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x8f9f6608a6003f10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) wait4(0x0, 0x0, 0x8, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="6707000000000000000011000000080003000000000000000000", @ANYRES32=r3, @ANYBLOB], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5af, 0x43}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4004001) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) dup2(r4, r1) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={0x0}}, 0xc001) 23:36:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socket$nl_route(0x10, 0x3, 0x0) pwritev2(r0, &(0x7f0000000700)=[{&(0x7f00000000c0)="df1aacab3affc71371101f24ba1656d96a64df0a510ab2f9aa9034db4f3e713b207fcdb3971f7093d0f0cba6cf979eda295e9220cb3246c3f96d03", 0x3b}, {&(0x7f00000003c0)="95d32c67d84af1f954672b35f341b125554cdd9b3a73edd11347e9df01c9071d410d2c16113a66", 0x27}, {&(0x7f0000000400)="b397d1d3c8aa06450623c6c23706c1d4c158dbc3fcbbdd8394012c74581e859bd952493e3893af402efdaba51235a4233e5d2091ede39035be0b2c3c7a6250275ebf216f3131327f62233b7dec96978a81b5029590da5eaa8507b22bbfd0d6725896c704517fc6074b0d5e41ca01bf133f6523fb78b638d599604f671ba1eba7b3b77464", 0x84}, {0x0}, {&(0x7f0000000580)="98", 0x1}, {&(0x7f00000005c0)}], 0x6, 0x3, 0x9, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x8f9f6608a6003f10) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) wait4(0x0, 0x0, 0x8, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="6707000000000000000011000000080003000000000000000000", @ANYRES32=r3, @ANYBLOB], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5af, 0x43}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4004001) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) dup2(r4, r1) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={0x0}}, 0xc001) 23:36:30 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x75c4f2668ab45b70}, 0x0, 0x0, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)="729f2a38875bbb89feae9afa5dd237a33addcfc5fd9565e72531252f041d8a987f5ba401eb8ce2b45a18c3166042be07ad47f7f0a01e7d1da7003ed3c3e5ef2b96f31f8574062a2ff2073afb234cb05df61cca1c6cd97a5b7eb12f12bb933725e21b85b904d10b4cb008f7bdfd4725197bdbe1150cf062910e3f6f86df0f09a91102fd1cc41eccc4efd5ee7566a4112e471b5caf9f9bd6ef48d44cc18bbd64e827539a3b2b", 0xa5}, {&(0x7f0000000480)}], 0x2}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @local}}, [0x9, 0x8a, 0x380, 0xb30, 0x9, 0xec4, 0x6, 0x7, 0x2, 0x3, 0x84ad, 0x10000, 0xffff, 0x0, 0xcbb]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000300)={r5, 0x6, 0x2, [0x200, 0x4aa7]}, &(0x7f0000000340)=0xc) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffffffffff50, &(0x7f0000000180)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002a000000e8bd6e00b86e14000e000100240248ff050005001200", 0x44}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)) 23:36:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5}, 0x0, 0x2, 0x0, 0x4, 0x0, 0xfffffffe, 0xcd27}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f00000002c0)={[{@fat=@flush='flush'}]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000480)={0x1, 0x3}) r3 = syz_genetlink_get_family_id$nl80211(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000980)='ethtool\x00') sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, 0x0, 0x40000) r4 = dup(0xffffffffffffffff) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) fanotify_mark(r5, 0x80, 0x0, r4, &(0x7f0000000440)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000006000400000000000200ff00", @ANYRES32=0x0, @ANYBLOB="9fa28200", @ANYRES32, @ANYRESHEX=r7, @ANYRES32=r0, @ANYBLOB="040000000001000088000400", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00', @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="10000100000000002000000000000000"], 0x6c, 0x2) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r3, 0x400, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x5c}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008810) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000340)={0x0, 0x3, 0xb9f8, 0x80800, r2}) 23:36:30 executing program 4: setsockopt(0xffffffffffffffff, 0xfff, 0xffffffff, &(0x7f0000000280)="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", 0xfe) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400026601000240000004f8", 0x16}, {0x0, 0x0, 0xffffffff}], 0x8003, &(0x7f0000000240)) [ 200.945230] hub 9-0:1.0: USB hub found [ 200.954487] hub 9-0:1.0: 8 ports detected 23:36:30 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000240)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x0, 0x3}}, 0x80, 0x0, 0x0, 0x0, 0x12b8}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000380)=""/4, 0x4, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x400, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:36:30 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000e8ffff00", "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) r6 = socket$l2tp6(0xa, 0x2, 0x73) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x1) dup(0xffffffffffffffff) [ 201.008889] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 201.082095] Bluetooth: hci4 command 0x0409 tx timeout [ 201.176129] audit: type=1804 audit(1607470590.903:19): pid=10644 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/1/file1/file0" dev="loop3" ino=9 res=1 23:36:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) 23:36:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5}, 0x0, 0x2, 0x0, 0x4, 0x0, 0xfffffffe, 0xcd27}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f00000002c0)={[{@fat=@flush='flush'}]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000480)={0x1, 0x3}) r3 = syz_genetlink_get_family_id$nl80211(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000980)='ethtool\x00') sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, 0x0, 0x40000) r4 = dup(0xffffffffffffffff) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) fanotify_mark(r5, 0x80, 0x0, r4, &(0x7f0000000440)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000006000400000000000200ff00", @ANYRES32=0x0, @ANYBLOB="9fa28200", @ANYRES32, @ANYRESHEX=r7, @ANYRES32=r0, @ANYBLOB="040000000001000088000400", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00', @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=r8, @ANYBLOB="10000100000000002000000000000000"], 0x6c, 0x2) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r3, 0x400, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x1, 0x5c}}}}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008810) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000340)={0x0, 0x3, 0xb9f8, 0x80800, r2}) 23:36:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) [ 201.294511] audit: type=1804 audit(1607470591.023:20): pid=10656 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir568554735/syzkaller.ahXNGq/19/bus" dev="sda1" ino=15844 res=1 [ 201.320400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:36:31 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"/1638], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) sendmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)='+', 0x2}], 0x1}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000340)='5', 0x1}], 0x1}}], 0x2, 0x0) [ 201.491626] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 201.500304] audit: type=1804 audit(1607470591.223:21): pid=10664 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/2/file1/file0" dev="loop3" ino=10 res=1 23:36:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) 23:36:31 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 201.756409] audit: type=1804 audit(1607470591.313:22): pid=10686 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/14/file1/file0" dev="sda1" ino=15847 res=1 23:36:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000000)={0x0, @data}) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) 23:36:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000, 0xc615}, 0x11060}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0) clone(0xc75e43cbac22cd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$hfsplus(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000640)=[{&(0x7f0000000700)="54e8ce1a3d92668a4f2f9a403b0015be2a1f0be9e2ae030000000000002431af194260d8e4ab2a11775915ff5f3556dab8767a1967d9dada2016f5f45bed6a14eed9c2290becfdb83f534626b31f06b9ba7e2c09fd5fdb884267679d0419f543a462d155c237c2bdeaf514e9f091b20e10e591b433c316580b8976d35bda208f87c0ea28", 0x84, 0xfe}, {&(0x7f0000000480)="6059f953bb28a0a991abeb4031238f8cce7f5d3f3da3b2c06e11c4ceb6fc9a", 0x1f, 0xfffffffffffffff7}, {&(0x7f0000001580), 0x0, 0x3}, {&(0x7f0000000240)="271775250be60524df47f518e3f93b73040113cf57a88a0f43f3af59", 0x1c}], 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='barrier,decompose,force,nodecompose,gid=', @ANYRESHEX=0x0, @ANYBLOB=',fowner', @ANYRESDEC=0xee00, @ANYBLOB=',smackfsdef=),fscontext=staff_u']) r0 = syz_open_pts(0xffffffffffffffff, 0x5a7400) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000000)) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000200)={0x1}) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) close(r1) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000080)={0x0, 0x3, 0x952}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f00000002c0)=""/251) r4 = socket$inet_icmp(0x2, 0x2, 0x1) getresuid(&(0x7f0000000600), &(0x7f00000006c0), &(0x7f00000007c0)=0x0) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@rand_addr=0x64010102, @in6=@rand_addr=' \x01\x00', 0x4e24, 0x1000, 0x4e23, 0x6, 0x2, 0x20, 0xc0, 0x2f, 0x0, r5}, {0x1f, 0xf, 0x0, 0x8, 0x6, 0x6, 0x6a6, 0x6}, {0xffffffffffffffe1, 0x5, 0x9, 0x754a6b1a}, 0x1, 0x6e6bbc, 0x2, 0x0, 0x7, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x4d2, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x4, 0x3, 0x0, 0x35a1c376, 0x1, 0xffffffc0}}, 0xe8) socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000840)={&(0x7f0000000800)=[0x40010001, 0x1355fa1e], 0x2, 0xc0000}) [ 201.811325] audit: type=1804 audit(1607470591.343:23): pid=10678 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir568554735/syzkaller.ahXNGq/19/bus" dev="sda1" ino=15844 res=1 [ 201.831794] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 201.881323] audit: type=1804 audit(1607470591.603:24): pid=10701 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/3/file1/file0" dev="sda1" ino=15834 res=1 23:36:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) 23:36:31 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000240)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x0, 0x3}}, 0x80, 0x0, 0x0, 0x0, 0x12b8}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000380)=""/4, 0x4, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x400, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:36:31 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)=0x8001) r1 = getpgid(r0) ptrace$peekuser(0x3, r1, 0x13b) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x59) setuid(0x0) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f00000013c0)="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", 0x1000, 0x5b17}], 0x1000, &(0x7f0000002600)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clock_gettime(0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000180)="f30fd6de66b80a0000000f23c00f21f86635010002000f23f8660f5ed90f01cf66b93b00000066b80000010066ba000000000f3067b607c70f0ff80c66b81eb0d68866efbafc0cb8e72feff30f1efe0f20e16635400000000f22e0360f2fe3", 0x5f}], 0x1, 0x13, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netrom_NETROM_N2(r6, 0x103, 0x3, &(0x7f0000000080), 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 202.104625] audit: type=1804 audit(1607470591.753:25): pid=10713 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/17/file1/file0" dev="sda1" ino=15836 res=1 [ 202.181635] audit: type=1804 audit(1607470591.913:26): pid=10648 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir568554735/syzkaller.ahXNGq/19/bus" dev="sda1" ino=15844 res=1 23:36:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) 23:36:32 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000e8ffff00", "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) r6 = socket$l2tp6(0xa, 0x2, 0x73) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x1) dup(0xffffffffffffffff) 23:36:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x4000000090}, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x8001, 0x3, 0x4, 0xe000, 0x3, {}, {0x4, 0x0, 0x6, 0x0, 0x0, 0x8, "5f6eb1b6"}, 0x0, 0x3, @userptr=0x8, 0x7fffffff}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$MON_IOCX_GET(r3, 0x40189206, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000340)={0x9, 0x101, {0x55, 0x2, 0x5, {0x1f, 0x6}, {0xea, 0x5}, @period={0x5a, 0x1f, 0x3, 0x1f, 0x1ff, {0x454, 0x5, 0x1, 0xffff}, 0xa, &(0x7f0000000300)=[0x0, 0x9, 0x1ff, 0x9, 0x6, 0x3, 0x4, 0x1f, 0x7fff, 0xfffd]}}, {0x57, 0x401, 0x400, {0x1, 0x5e}, {0x0, 0x6}, @const={0x2, {0x9, 0x6, 0x3ff, 0x3f}}}}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x3, 0x29, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="66641d2a6dfb586b77331cf9599c0d512a8496068b5fe59d93cbb46874e803923ec47f2830ef3f47be379d50fea81eea4d7859b3f74705ff1fbc74715202fc9c2e3e7c2fab21911d634bdb19ec1090dfb134c1019f91be0f1457f6ff1a722e81a66de4a556f05c4470d2733a349ce069ab5d2a4f40a3527e3a", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00096a69ad2321f8b57b64c2feb18728002f5ae8c0e29bed9a0929de027dfc84586676263056ba9b63c85f1c8b95bde8e684d76473210e39037e951bed844f51ab12f1fd21e2994d36a8c3cbdd471be77c4f7cb4cac0e8e1f58d366765cfaa3d87a4f1184c7a6e691e5ff9cad22e11b91e70bc"]) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000280)=0x7fe5) [ 202.300539] audit: type=1804 audit(1607470592.023:27): pid=10731 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/4/file1/file0" dev="sda1" ino=15851 res=1 23:36:32 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000e8ffff00", "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) r6 = socket$l2tp6(0xa, 0x2, 0x73) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x1) dup(0xffffffffffffffff) 23:36:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f00000000000004", 0x1b, 0x4200}], 0x0, &(0x7f00000003c0)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:36:32 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) [ 202.892477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:36:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) 23:36:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) [ 203.133083] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 203.161059] Bluetooth: hci4 command 0x041b tx timeout [ 203.163409] EXT4-fs (loop1): mount failed 23:36:34 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) sendmmsg(r3, &(0x7f0000001500), 0x588, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) 23:36:34 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000e8ffff00", "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) r6 = socket$l2tp6(0xa, 0x2, 0x73) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x1) dup(0xffffffffffffffff) 23:36:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) 23:36:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) [ 205.242060] Bluetooth: hci4 command 0x040f tx timeout 23:36:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) [ 205.794284] kauditd_printk_skb: 10 callbacks suppressed [ 205.794291] audit: type=1804 audit(1607470595.523:38): pid=10829 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/21/file0" dev="sda1" ino=15857 res=1 23:36:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) [ 206.059883] FAT-fs (loop0): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 206.059883] 1w´" or missing value [ 206.317320] audit: type=1804 audit(1607470596.043:39): pid=10849 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/7/file1/file0" dev="sda1" ino=15859 res=1 [ 206.402302] audit: type=1804 audit(1607470596.123:40): pid=10846 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/19/file1/file0" dev="loop2" ino=16 res=1 23:36:36 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) sendmmsg(r3, &(0x7f0000001500), 0x588, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:36 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000e8ffff00", "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020001) creat(&(0x7f0000000100)='./bus\x00', 0x0) r6 = socket$l2tp6(0xa, 0x2, 0x73) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x1) dup(0xffffffffffffffff) 23:36:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) sendfile(r3, r4, 0x0, 0x1c500) [ 207.233819] audit: type=1804 audit(1607470596.933:41): pid=10870 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir568554735/syzkaller.ahXNGq/22/bus" dev="sda1" ino=15831 res=1 [ 207.270269] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 207.302405] FAT-fs (loop3): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 207.302405] 1w´" or missing value [ 207.321031] Bluetooth: hci4 command 0x0419 tx timeout 23:36:38 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) sendmmsg(r3, &(0x7f0000001500), 0x588, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:38 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) [ 208.508830] audit: type=1804 audit(1607470597.003:42): pid=10873 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/8/file0" dev="sda1" ino=15861 res=1 23:36:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:38 executing program 2: ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010001fff000005000700000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000020000280012800a00010076786c616e0000001800028014000c00f5"], 0x48}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0x0) [ 208.768714] audit: type=1804 audit(1607470597.163:43): pid=10875 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/20/file1/file0" dev="loop2" ino=18 res=1 23:36:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() keyctl$set_timeout(0xf, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x5c}}, 0x40000) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000600)={0x26, "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"}) dup(0xffffffffffffffff) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) readv(r4, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3) [ 209.050240] audit: type=1804 audit(1607470597.183:44): pid=10861 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/18/file1/file0" dev="loop5" ino=17 res=1 [ 209.075190] audit: type=1804 audit(1607470597.303:45): pid=10870 uid=0 auid=0 ses=4 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir568554735/syzkaller.ahXNGq/22/bus" dev="sda1" ino=15831 res=1 [ 209.106064] audit: type=1804 audit(1607470598.453:46): pid=10891 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/9/file1/file0" dev="loop3" ino=19 res=1 23:36:38 executing program 5: r0 = perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x93, 0x0, 0x6, 0x0, 0x0, 0x5, 0x2049, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x2, @perf_bp={&(0x7f0000000280), 0xa}, 0x42, 0x0, 0x4, 0x6, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/40, 0x28}, 0x12020) r2 = shmat(0x0, &(0x7f0000ff7000/0x1000)=nil, 0x6000) shmdt(r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x10, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xcf214970a40bd068) r8 = accept4$llc(r6, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x10, 0x100800) ioctl$sock_SIOCBRADDBR(r8, 0x89a0, &(0x7f0000000180)='batadv0\x00') write$P9_RWRITE(r7, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x1d30}, 0xb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000002400)="b9800000c03500400000665c0f5d0202f5fbfb20e035c5e17de74b064000c4635765f766400fc774a600f30fbcf726660f388077694f4f0f5c19db3a9af342d8868680000066b82001c4220d2d4f5d2e66420fc73366ba2000ed", 0x5a}], 0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f00000001c0)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:36:39 executing program 5: r0 = perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x93, 0x0, 0x6, 0x0, 0x0, 0x5, 0x2049, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x2, @perf_bp={&(0x7f0000000280), 0xa}, 0x42, 0x0, 0x4, 0x6, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/40, 0x28}, 0x12020) r2 = shmat(0x0, &(0x7f0000ff7000/0x1000)=nil, 0x6000) shmdt(r2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x10, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xcf214970a40bd068) r8 = accept4$llc(r6, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x10, 0x100800) ioctl$sock_SIOCBRADDBR(r8, 0x89a0, &(0x7f0000000180)='batadv0\x00') write$P9_RWRITE(r7, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x1d30}, 0xb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000002400)="b9800000c03500400000665c0f5d0202f5fbfb20e035c5e17de74b064000c4635765f766400fc774a600f30fbcf726660f388077694f4f0f5c19db3a9af342d8868680000066b82001c4220d2d4f5d2e66420fc73366ba2000ed", 0x5a}], 0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5) ioctl$sock_SIOCOUTQ(r7, 0x5411, &(0x7f00000001c0)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 23:36:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 209.686396] audit: type=1804 audit(1607470599.413:47): pid=10926 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/10/file1/file0" dev="loop3" ino=20 res=1 23:36:40 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 23:36:40 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 23:36:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) sendmmsg(r3, &(0x7f0000001500), 0x588, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 211.557604] kauditd_printk_skb: 2 callbacks suppressed [ 211.557614] audit: type=1804 audit(1607470601.283:50): pid=10966 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/25/file1/file0" dev="sda1" ino=15872 res=1 [ 211.806633] audit: type=1804 audit(1607470601.533:51): pid=10985 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/12/file0" dev="sda1" ino=15867 res=1 23:36:41 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 23:36:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 211.842520] FAT-fs (loop3): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 211.842520] 1w´" or missing value 23:36:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() keyctl$set_timeout(0xf, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x5c}}, 0x40000) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000600)={0x26, "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"}) dup(0xffffffffffffffff) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) readv(r4, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3) 23:36:41 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:42 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:42 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$NFT_MSG_GETGEN(r4, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:42 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 23:36:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 212.732440] audit: type=1804 audit(1607470602.453:52): pid=11031 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/13/file1/file0" dev="loop3" ino=23 res=1 23:36:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:43 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:43 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) [ 213.665465] audit: type=1804 audit(1607470603.393:53): pid=11060 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/14/file1/file0" dev="loop3" ino=24 res=1 23:36:43 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) [ 214.107752] audit: type=1804 audit(1607470603.393:54): pid=11048 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/27/file0" dev="sda1" ino=15893 res=1 23:36:44 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) 23:36:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:44 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 214.740272] audit: type=1804 audit(1607470604.463:55): pid=11099 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/28/file1/file0" dev="sda1" ino=15899 res=1 [ 214.740811] 9pnet: Insufficient options for proto=fd 23:36:44 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r1, 0x0, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:45 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 215.910782] audit: type=1804 audit(1607470604.513:56): pid=11083 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/15/file1/file0" dev="loop3" ino=26 res=1 23:36:45 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:45 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:45 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 216.055886] audit: type=1804 audit(1607470604.523:57): pid=11085 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/24/file1/file0" dev="loop5" ino=25 res=1 [ 216.078859] audit: type=1804 audit(1607470605.763:58): pid=11119 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/16/file1/file0" dev="loop3" ino=27 res=1 23:36:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 216.368482] audit: type=1804 audit(1607470606.093:59): pid=11140 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/29/file1/file0" dev="loop0" ino=28 res=1 23:36:46 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:46 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:46 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:46 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:46 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) socket$inet6(0xa, 0x806, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 217.406095] audit: type=1804 audit(1607470607.133:60): pid=11174 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/17/file1/file0" dev="sda1" ino=15913 res=1 [ 217.426667] 9pnet: Insufficient options for proto=fd 23:36:47 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) socket$inet6(0xa, 0x806, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:47 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) socket$inet6(0xa, 0x806, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:47 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:47 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 218.174438] audit: type=1804 audit(1607470607.893:61): pid=11218 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/18/file1/file0" dev="loop3" ino=29 res=1 23:36:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) socket$inet6(0xa, 0x806, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:48 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:48 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:48 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 218.991051] audit: type=1804 audit(1607470608.713:62): pid=11271 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/19/file1/file0" dev="loop3" ino=30 res=1 23:36:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:49 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:49 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 219.825904] audit: type=1804 audit(1607470609.553:63): pid=11330 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/20/file1/file0" dev="sda1" ino=15931 res=1 23:36:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:50 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:36:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 0: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 220.529308] audit: type=1804 audit(1607470610.253:64): pid=11380 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/21/file1/file0" dev="sda1" ino=15829 res=1 23:36:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:50 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:50 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:50 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 221.456972] audit: type=1804 audit(1607470611.183:65): pid=11414 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/22/file1/file0" dev="loop3" ino=31 res=1 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 221.656688] audit: type=1804 audit(1607470611.383:66): pid=11441 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/23/file1/file0" dev="loop3" ino=32 res=1 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1c500) [ 221.872636] audit: type=1804 audit(1607470611.603:67): pid=11469 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/24/file1/file0" dev="loop3" ino=33 res=1 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:51 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1c500) 23:36:51 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:51 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1c500) 23:36:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:52 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) [ 222.874567] audit: type=1804 audit(1607470612.593:68): pid=11583 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/28/file1/file0" dev="loop3" ino=37 res=1 23:36:52 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:52 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:52 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:53 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:53 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r1, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) [ 223.734883] audit: type=1804 audit(1607470613.453:69): pid=11629 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/29/file0" dev="sda1" ino=15967 res=1 23:36:53 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:53 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000200)={0x18}, 0x18) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:53 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:54 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:36:54 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:36:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:54 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) dup(r0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:54 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000200)={0x18}, 0x18) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 224.592366] print_req_error: I/O error, dev loop3, sector 0 23:36:54 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 224.690072] audit: type=1804 audit(1607470614.413:70): pid=11657 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/69/file1/file0" dev="loop1" ino=38 res=1 23:36:55 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:55 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:55 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 225.760432] audit: type=1804 audit(1607470614.463:71): pid=11669 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/62/file1/file0" dev="loop5" ino=39 res=1 23:36:55 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1c500) 23:36:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) [ 225.922372] audit: type=1804 audit(1607470615.323:72): pid=11672 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/30/file1/file0" dev="loop3" ino=40 res=1 23:36:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, 0x0) 23:36:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:55 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:55 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:36:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:56 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 226.290663] audit: type=1804 audit(1607470616.013:73): pid=11733 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/71/file1/file0" dev="loop1" ino=42 res=1 [ 226.339733] audit: type=1804 audit(1607470616.023:74): pid=11734 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/64/file1/file0" dev="loop5" ino=43 res=1 23:36:57 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:36:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:57 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:36:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1c500) [ 227.467220] audit: type=1804 audit(1607470617.023:75): pid=11744 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/65/file1/file0" dev="loop2" ino=44 res=1 23:36:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:57 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:57 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1c500) 23:36:57 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:57 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 228.134663] audit: type=1804 audit(1607470617.413:76): pid=11757 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/32/file0" dev="sda1" ino=15985 res=1 23:36:58 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:58 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) [ 228.571127] audit: type=1804 audit(1607470618.293:77): pid=11795 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/33/file0" dev="sda1" ino=15985 res=1 23:36:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:58 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 228.836319] audit: type=1804 audit(1607470618.323:78): pid=11804 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/67/file0" dev="sda1" ino=15986 res=1 23:36:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:59 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 229.267600] audit: type=1804 audit(1607470618.343:79): pid=11807 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/70/file0" dev="sda1" ino=15988 res=1 [ 229.325178] FAT-fs (loop1): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 229.325178] 1w´" or missing value 23:36:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 229.392577] audit: type=1804 audit(1607470618.763:80): pid=11820 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/74/file0" dev="sda1" ino=15994 res=1 23:36:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 229.475444] audit: type=1804 audit(1607470619.183:81): pid=11834 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/68/file1/file0" dev="loop2" ino=47 res=1 [ 229.499369] audit: type=1804 audit(1607470619.213:82): pid=11843 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/34/file0" dev="sda1" ino=15976 res=1 23:36:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:36:59 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 229.752358] audit: type=1804 audit(1607470619.473:83): pid=11852 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/68/file0" dev="sda1" ino=15980 res=1 [ 230.013964] audit: type=1804 audit(1607470619.743:84): pid=11871 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/71/file0" dev="sda1" ino=15999 res=1 23:36:59 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:36:59 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 230.307001] audit: type=1804 audit(1607470619.893:85): pid=11880 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/75/file1/file0" dev="sda1" ino=16000 res=1 23:37:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:00 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:00 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:00 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 231.699775] print_req_error: I/O error, dev loop3, sector 0 23:37:01 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:02 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:02 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:02 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:03 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 233.495372] kauditd_printk_skb: 8 callbacks suppressed [ 233.495380] audit: type=1804 audit(1607470623.223:94): pid=11981 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/37/file1/file0" dev="sda1" ino=16020 res=1 23:37:03 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 233.652589] audit: type=1804 audit(1607470623.353:95): pid=11987 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/75/file0" dev="sda1" ino=16021 res=1 23:37:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:03 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:03 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:04 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:04 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) [ 234.368864] audit: type=1804 audit(1607470624.093:96): pid=12020 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/38/file1/file0" dev="loop3" ino=51 res=1 23:37:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:05 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 235.602120] audit: type=1804 audit(1607470624.173:97): pid=12016 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/80/file1/file0" dev="loop1" ino=52 res=1 23:37:05 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) [ 236.436356] FAT-fs (loop1): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 236.436356] 1w´" or missing value 23:37:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:06 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:06 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) [ 236.768205] audit: type=1804 audit(1607470625.173:98): pid=12028 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/72/file1/file0" dev="loop2" ino=53 res=1 [ 236.795618] audit: type=1804 audit(1607470625.273:99): pid=12037 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/76/file1/file0" dev="sda1" ino=15824 res=1 23:37:06 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 236.851006] audit: type=1804 audit(1607470625.623:100): pid=12049 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/39/file1/file0" dev="loop3" ino=54 res=1 [ 236.895077] audit: type=1804 audit(1607470626.113:101): pid=12056 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/81/file0" dev="sda1" ino=16033 res=1 [ 236.918572] audit: type=1804 audit(1607470626.543:102): pid=12064 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/74/file1/file0" dev="loop5" ino=55 res=1 23:37:06 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 237.101162] FAT-fs (loop0): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 237.101162] 1w´" or missing value 23:37:06 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 237.433370] audit: type=1804 audit(1607470626.623:103): pid=12075 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/40/file1/file0" dev="sda1" ino=16018 res=1 23:37:07 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:07 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 238.493934] FAT-fs (loop2): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 238.493934] 1w´" or missing value 23:37:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:08 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:08 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:08 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 239.105593] kauditd_printk_skb: 4 callbacks suppressed [ 239.105602] audit: type=1804 audit(1607470628.833:108): pid=12178 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/79/file1/file0" dev="loop0" ino=56 res=1 23:37:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:09 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:09 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:09 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 240.179628] audit: type=1804 audit(1607470628.843:109): pid=12171 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/86/file1/file0" dev="loop1" ino=57 res=1 [ 240.205359] audit: type=1804 audit(1607470628.853:110): pid=12181 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/42/file0" dev="sda1" ino=15743 res=1 23:37:09 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:37:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:10 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:10 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:37:10 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) socket$inet6(0xa, 0x806, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 240.454023] audit: type=1804 audit(1607470630.183:111): pid=12216 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/43/file1/file0" dev="sda1" ino=16022 res=1 23:37:10 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 240.651656] audit: type=1804 audit(1607470630.373:112): pid=12231 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/80/file1/file0" dev="loop0" ino=58 res=1 23:37:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, 0x0, 0x0) 23:37:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:11 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) [ 241.489532] audit: type=1804 audit(1607470631.213:113): pid=12260 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/44/file0" dev="sda1" ino=16061 res=1 23:37:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 241.669587] FAT-fs (loop3): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 241.669587] 1w´" or missing value 23:37:11 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) 23:37:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, 0x0, 0x0) [ 241.828594] audit: type=1804 audit(1607470631.263:114): pid=12250 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/90/file1/file0" dev="loop1" ino=59 res=1 23:37:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, 0x0, 0x0) 23:37:11 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 242.076555] FAT-fs (loop2): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 242.076555] 1w´" or missing value 23:37:11 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 242.334369] audit: type=1804 audit(1607470631.623:115): pid=12275 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/81/file0" dev="sda1" ino=16059 res=1 23:37:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:12 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) sendfile(r2, r3, 0x0, 0x1c500) 23:37:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x8, 0x81, 0x3, 0x25, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) listen(r1, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000001200)={0x0, @in6={{0xa, 0x0, 0x80, @empty, 0x4}}, 0xfffffa51, 0x0, 0x7ff, 0x3ff, 0x7}, &(0x7f0000000040)=0x98) recvmmsg(r2, &(0x7f0000007940), 0x55, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x80fffffd, 0x0, 0x0, 0x0, 0x10, "00000000000000595fb3ddc93100"}) [ 242.888972] audit: type=1804 audit(1607470631.833:116): pid=12276 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/81/file1/file0" dev="loop0" ino=60 res=1 23:37:12 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) [ 242.967824] audit: type=1804 audit(1607470632.693:117): pid=12308 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/45/file1/file0" dev="sda1" ino=15976 res=1 [ 243.068278] 9pnet: Insufficient options for proto=fd 23:37:13 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) 23:37:13 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) 23:37:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) sendfile(r2, r3, 0x0, 0x1c500) 23:37:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:13 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev}, 0x10) 23:37:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) sendfile(r2, r3, 0x0, 0x1c500) 23:37:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 244.308879] kauditd_printk_skb: 4 callbacks suppressed [ 244.308887] audit: type=1804 audit(1607470634.033:122): pid=12346 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/83/file1/file0" dev="loop2" ino=64 res=1 23:37:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() keyctl$set_timeout(0xf, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x5c}}, 0x40000) sendmsg$NL80211_CMD_JOIN_OCB(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000600)={0x26, "749abd6c1adf327148f57c28d1358bdf4c4990c24e8797328bd4e53107d7078f31cc52cc70f41ef1baaec3dbb93ac993a886c063cc1c5d077e31ae8adbb05aedd47f65ff5f5211e7ec90231f4b489c6bfc5c7217d4021f977981853f00baae729493351527f7f16a0de5b0edc98b723181cdf871e5f4364fe3e52f471c47f24420b21c3bcdaa98ca1b010b5825978671188cdc731e53e23458ad29052efe7b47a08eb6b3dec2787832342ecd060a6c2fc3753525f489300e93c5e7dd66f2b1b3598b45c4b4f0cc82961f782cf07232eafd36e73a24f0ee94b332fde8007eacaceb4ac87d44161b473c657f764c4d6f753a6947f0f591822617ce63a27de0650f49bfceeac0ce863aea7ee16a11df8ba54014d2d014b83e59fbc40c9821f75c29a22e1b564b24e23e9efe86cdc6bbade341bc03caa3569f1b9ad3c92690b56c8aa3b9408e1d7db2c93a7b6dadf74d69e040e59f801da060dfcf5d19238397ea02878ce86149f23a4317238d8baeaef7010789c5f80cdd7d3b670c80a9fdc1dfed38de96c90901e3c217bf9c232d390b99076ea91e0655c519df0211d5008babc70a54b33f8134e0be84eaf1359d040a1989fffb613c744eaaf1d54d6b68f8be5d8c73da52418655e1521a49bc5b479ace1a63653481aaeb5d61f933bd7bdf1fcbe5c367da835d2809ff0f27e252105199ee995d37a437eef03d6370c9ec31810d"}) dup(0xffffffffffffffff) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) readv(r4, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3) 23:37:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) sendfile(r2, r3, 0x0, 0x1c500) 23:37:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) sendfile(r2, r3, 0x0, 0x1c500) [ 245.618696] audit: type=1804 audit(1607470634.253:123): pid=12359 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/92/file1/file0" dev="loop1" ino=65 res=1 23:37:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 246.009067] audit: type=1804 audit(1607470634.463:124): pid=12364 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/87/file1/file0" dev="loop5" ino=66 res=1 23:37:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:17 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) [ 247.602731] audit: type=1804 audit(1607470635.343:125): pid=12369 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/47/file1/file0" dev="loop3" ino=67 res=1 23:37:17 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) [ 247.656357] audit: type=1804 audit(1607470635.403:126): pid=12382 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir568554735/syzkaller.ahXNGq/104/file1/file0" dev="sda1" ino=15974 res=1 [ 247.684592] audit: type=1804 audit(1607470635.573:127): pid=12393 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/84/file1/file0" dev="sda1" ino=16070 res=1 [ 247.711569] audit: type=1804 audit(1607470635.723:128): pid=12394 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/88/file1/file0" dev="loop5" ino=68 res=1 [ 247.737764] audit: type=1804 audit(1607470635.913:129): pid=12400 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/93/file1/file0" dev="loop1" ino=69 res=1 [ 247.808268] audit: type=1804 audit(1607470637.273:130): pid=12406 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/48/file1/file0" dev="loop3" ino=70 res=1 [ 247.830972] audit: type=1804 audit(1607470637.493:131): pid=12415 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/85/file0" dev="sda1" ino=15770 res=1 [ 247.899533] FAT-fs (loop0): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 247.899533] 1w´" or missing value 23:37:17 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) [ 248.013491] FAT-fs (loop4): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 248.013491] 1w´" or missing value 23:37:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 23:37:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:18 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:18 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 248.709298] 9pnet: Insufficient options for proto=fd 23:37:18 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="1500000065ffff0180400008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000200)={0x18}, 0x18) write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0xee01}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f0000000140)="96bb7f78fa1b356d5beaed3e1c0c79", 0xf) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg(r4, &(0x7f0000000ac0)=[{{0x0, 0x5d, &(0x7f0000000180)=[{&(0x7f0000000880)='T', 0x1}], 0x1}}], 0x503, 0x0) socket$packet(0x11, 0x0, 0x300) setresgid(0x0, 0x0, 0x0) 23:37:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) [ 249.350116] kauditd_printk_skb: 8 callbacks suppressed [ 249.350124] audit: type=1804 audit(1607470639.073:140): pid=12507 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/87/file1/file0" dev="sda1" ino=15764 res=1 23:37:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) [ 249.940281] FAT-fs (loop1): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 249.940281] 1w´" or missing value 23:37:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 250.778764] audit: type=1804 audit(1607470639.213:141): pid=12508 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir236406517/syzkaller.lGLc8q/86/file1/file0" dev="sda1" ino=15745 res=1 23:37:20 executing program 2 (fault-call:7 fault-nth:0): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:20 executing program 4 (fault-call:2 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) [ 250.846692] audit: type=1804 audit(1607470639.533:142): pid=12519 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir182195932/syzkaller.SCHFIn/96/file0" dev="sda1" ino=15755 res=1 23:37:20 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) [ 250.924269] audit: type=1804 audit(1607470639.933:143): pid=12530 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/52/file1/file0" dev="loop3" ino=75 res=1 [ 250.946661] audit: type=1804 audit(1607470640.643:144): pid=12540 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/88/file1/file0" dev="loop0" ino=76 res=1 [ 251.025177] FAULT_INJECTION: forcing a failure. [ 251.025177] name failslab, interval 1, probability 0, space 0, times 1 [ 251.036721] CPU: 0 PID: 12546 Comm: syz-executor.2 Not tainted 4.14.211-syzkaller #0 [ 251.044704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.054068] Call Trace: [ 251.056666] dump_stack+0x1b2/0x283 [ 251.060307] should_fail.cold+0x10a/0x154 [ 251.064498] should_failslab+0xd6/0x130 [ 251.068484] kmem_cache_alloc+0x40/0x3c0 [ 251.072558] __inet_hash_connect+0x61b/0xbf0 [ 251.076983] ? siphash_3u32+0x19/0x280 [ 251.080876] ? inet_unhash+0x420/0x420 [ 251.084771] ? inet_hash+0x90/0x90 [ 251.088322] dccp_v4_connect+0xb46/0x14e0 [ 251.092486] __inet_stream_connect+0x6ad/0xb90 [ 251.097169] ? inet_bind+0x960/0x960 [ 251.100891] ? mark_held_locks+0xa6/0xf0 [ 251.104960] ? __local_bh_enable_ip+0xc1/0x170 [ 251.109550] ? __inet_stream_connect+0xb90/0xb90 [ 251.114318] ? __inet_stream_connect+0xb90/0xb90 [ 251.119067] inet_stream_connect+0x53/0xa0 [ 251.123312] SyS_connect+0x1f4/0x240 [ 251.127055] ? SyS_accept+0x30/0x30 [ 251.130757] ? vfs_write+0x319/0x4d0 [ 251.134463] ? fput+0xb/0x140 [ 251.137682] ? SyS_write+0x14d/0x210 [ 251.141399] ? SyS_read+0x210/0x210 [ 251.145008] ? SyS_clock_settime+0x1a0/0x1a0 [ 251.149446] ? do_syscall_64+0x4c/0x640 [ 251.153404] ? SyS_accept+0x30/0x30 [ 251.157121] do_syscall_64+0x1d5/0x640 [ 251.160998] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 251.166171] RIP: 0033:0x45e0f9 23:37:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) [ 251.169340] RSP: 002b:00007f77c1af0c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 251.177035] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e0f9 [ 251.184390] RDX: 0000000000000010 RSI: 0000000020e5c000 RDI: 0000000000000004 [ 251.191655] RBP: 00007f77c1af0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 251.198916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 251.206181] R13: 00007ffeeb76180f R14: 00007f77c1af19c0 R15: 000000000119bf8c 23:37:20 executing program 2 (fault-call:7 fault-nth:1): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 251.292154] audit: type=1804 audit(1607470641.023:145): pid=12552 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/53/file1/file0" dev="loop3" ino=77 res=1 23:37:21 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x101, 0x1, 0x0, 0xfffffffa, 0x1b, "c02b48000000000000000000000000000900"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) [ 251.388876] FAULT_INJECTION: forcing a failure. [ 251.388876] name failslab, interval 1, probability 0, space 0, times 0 23:37:21 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r1, 0x0, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) [ 251.463184] CPU: 1 PID: 12556 Comm: syz-executor.2 Not tainted 4.14.211-syzkaller #0 [ 251.471109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.480480] Call Trace: [ 251.483077] dump_stack+0x1b2/0x283 [ 251.486758] should_fail.cold+0x10a/0x154 [ 251.490150] audit: type=1804 audit(1607470641.153:146): pid=12551 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir025433710/syzkaller.RdItKn/93/file1/file0" dev="loop5" ino=78 res=1 23:37:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 251.490912] should_failslab+0xd6/0x130 [ 251.516746] kmem_cache_alloc_node+0x263/0x410 [ 251.516761] __alloc_skb+0x5c/0x510 [ 251.516776] dccp_connect+0x1e1/0x5f0 [ 251.528892] dccp_v4_connect+0xcfa/0x14e0 [ 251.528914] __inet_stream_connect+0x6ad/0xb90 [ 251.528928] ? inet_bind+0x960/0x960 [ 251.549330] ? mark_held_locks+0xa6/0xf0 [ 251.549341] ? __local_bh_enable_ip+0xc1/0x170 [ 251.549357] ? __inet_stream_connect+0xb90/0xb90 [ 251.562784] ? __inet_stream_connect+0xb90/0xb90 [ 251.562793] inet_stream_connect+0x53/0xa0 [ 251.562808] SyS_connect+0x1f4/0x240 23:37:21 executing program 2 (fault-call:7 fault-nth:2): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 251.562818] ? SyS_accept+0x30/0x30 [ 251.562832] ? vfs_write+0x319/0x4d0 [ 251.562842] ? fput+0xb/0x140 23:37:22 executing program 2 (fault-call:7 fault-nth:3): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) [ 251.562852] ? SyS_write+0x14d/0x210 23:37:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) [ 251.562864] ? SyS_read+0x210/0x210 [ 251.562875] ? SyS_clock_settime+0x1a0/0x1a0 [ 251.562885] ? do_syscall_64+0x4c/0x640 23:37:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 251.562895] ? SyS_accept+0x30/0x30 [ 251.562909] do_syscall_64+0x1d5/0x640 [ 251.562928] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 251.562936] RIP: 0033:0x45e0f9 [ 251.562942] RSP: 002b:00007f77c1af0c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 251.562953] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e0f9 [ 251.562958] RDX: 0000000000000010 RSI: 0000000020e5c000 RDI: 0000000000000004 [ 251.562964] RBP: 00007f77c1af0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 251.562969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:37:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 251.562975] R13: 00007ffeeb76180f R14: 00007f77c1af19c0 R15: 000000000119bf8c [ 251.592438] audit: type=1804 audit(1607470641.323:147): pid=12573 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/89/file0" dev="sda1" ino=15755 res=1 [ 251.645920] FAT-fs (loop0): Unrecognized mount option "û±vŸË‡N{wÓÝXV“ú®OPcÌg¥*©ÞÐO[QÓŒîÏ…’>R‡WG릓ñ3ÞÕ.÷\xúçŽ.V5€Y°2€eï÷Þ“É¢—-7œ#[AÒe4Ójø‡A54|àŠŽ”Aì(u3I"{X×É3ùlúˆ"Ùû [ 251.645920] 1w´" or missing value 23:37:23 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000040)=0x2) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:23 executing program 5 (fault-call:2 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) [ 251.665431] audit: type=1804 audit(1607470641.393:148): pid=12579 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/54/file0" dev="sda1" ino=16095 res=1 [ 252.211162] FAULT_INJECTION: forcing a failure. [ 252.211162] name failslab, interval 1, probability 0, space 0, times 0 [ 252.211175] CPU: 1 PID: 12589 Comm: syz-executor.2 Not tainted 4.14.211-syzkaller #0 [ 252.211181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.211184] Call Trace: [ 252.211199] dump_stack+0x1b2/0x283 [ 252.211214] should_fail.cold+0x10a/0x154 [ 252.211229] should_failslab+0xd6/0x130 [ 252.211244] kmem_cache_alloc_node_trace+0x25a/0x400 [ 252.211258] __kmalloc_node_track_caller+0x38/0x70 [ 252.211271] __alloc_skb+0x96/0x510 [ 252.211285] dccp_connect+0x1e1/0x5f0 [ 252.211297] dccp_v4_connect+0xcfa/0x14e0 [ 252.211319] __inet_stream_connect+0x6ad/0xb90 [ 252.211334] ? inet_bind+0x960/0x960 [ 252.211346] ? mark_held_locks+0xa6/0xf0 [ 252.211358] ? __local_bh_enable_ip+0xc1/0x170 [ 252.211370] ? __inet_stream_connect+0xb90/0xb90 [ 252.211383] ? __inet_stream_connect+0xb90/0xb90 [ 252.211391] inet_stream_connect+0x53/0xa0 [ 252.211404] SyS_connect+0x1f4/0x240 [ 252.211415] ? SyS_accept+0x30/0x30 [ 252.211429] ? vfs_write+0x319/0x4d0 [ 252.211442] ? fput+0xb/0x140 [ 252.211453] ? SyS_write+0x14d/0x210 [ 252.211464] ? SyS_read+0x210/0x210 [ 252.211473] ? SyS_clock_settime+0x1a0/0x1a0 [ 252.211483] ? do_syscall_64+0x4c/0x640 [ 252.211493] ? SyS_accept+0x30/0x30 [ 252.211505] do_syscall_64+0x1d5/0x640 [ 252.211523] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 252.211531] RIP: 0033:0x45e0f9 [ 252.211537] RSP: 002b:00007f77c1acfc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 252.211548] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e0f9 [ 252.211557] RDX: 0000000000000010 RSI: 0000000020e5c000 RDI: 0000000000000003 [ 252.211564] RBP: 00007f77c1acfca0 R08: 0000000000000000 R09: 0000000000000000 [ 252.211570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 252.211577] R13: 00007ffeeb76180f R14: 00007f77c1ad09c0 R15: 000000000119c034 [ 252.445771] FAULT_INJECTION: forcing a failure. [ 252.445771] name failslab, interval 1, probability 0, space 0, times 0 [ 252.445784] CPU: 1 PID: 12595 Comm: syz-executor.2 Not tainted 4.14.211-syzkaller #0 [ 252.445790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.445794] Call Trace: [ 252.445809] dump_stack+0x1b2/0x283 [ 252.445824] should_fail.cold+0x10a/0x154 [ 252.445839] should_failslab+0xd6/0x130 [ 252.445851] kmem_cache_alloc+0x28e/0x3c0 [ 252.445865] skb_clone+0x126/0x9a0 [ 252.445878] dccp_connect+0x2d4/0x5f0 [ 252.445890] dccp_v4_connect+0xcfa/0x14e0 [ 252.445911] __inet_stream_connect+0x6ad/0xb90 [ 252.445924] ? inet_bind+0x960/0x960 [ 252.445937] ? mark_held_locks+0xa6/0xf0 [ 252.445950] ? __local_bh_enable_ip+0xc1/0x170 [ 252.445961] ? __inet_stream_connect+0xb90/0xb90 [ 252.445974] ? __inet_stream_connect+0xb90/0xb90 [ 252.445984] inet_stream_connect+0x53/0xa0 [ 252.445997] SyS_connect+0x1f4/0x240 [ 252.446008] ? SyS_accept+0x30/0x30 [ 252.446024] ? vfs_write+0x319/0x4d0 [ 252.446036] ? fput+0xb/0x140 [ 252.446048] ? SyS_write+0x14d/0x210 [ 252.446058] ? SyS_read+0x210/0x210 [ 252.446068] ? SyS_clock_settime+0x1a0/0x1a0 [ 252.446079] ? do_syscall_64+0x4c/0x640 [ 252.446091] ? SyS_accept+0x30/0x30 [ 252.446103] do_syscall_64+0x1d5/0x640 [ 252.446123] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 252.446133] RIP: 0033:0x45e0f9 [ 252.446139] RSP: 002b:00007f77c1af0c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 252.446152] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e0f9 [ 252.446159] RDX: 0000000000000010 RSI: 0000000020e5c000 RDI: 0000000000000004 [ 252.446166] RBP: 00007f77c1af0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 252.446170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 252.446176] R13: 00007ffeeb76180f R14: 00007f77c1af19c0 R15: 000000000119bf8c 23:37:23 executing program 1: get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x1, &(0x7f0000ffb000/0x4000)=nil, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000280)) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x25) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x321001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1c) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x3810c1, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$bt_rfcomm(r6, &(0x7f00000002c0)={0x1f, @any, 0x1f}, 0xa) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x7, 0x41) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="3400000995c07e0f184f09f1980872eebb69dfe38be1d6ae937aef3c2473403ef2deb26a80e682a2e1f69a03ae1276333810ca499a995e5a1529c55ee0f9b0800f8d796e8c13", @ANYRES16=r7, @ANYBLOB="c2aeccc6f6d530d979037ce3dd3a4d405b606c8aa986935305d7b807bd89a3934129674d5532c53d3b5aeb4ab2c608f7f4a5afc63f7609c2343f36ba68ae1bf72c5f0411f522554aa717aac86f028c6cad6791e995a6cfbfb5584d87c3572767bb9f201b3576a82f0f5954cdc6cc8e2a7fd920d72275d58463390ad9c63dc4b1287dc9fb5ed0d7a7faf2f763f37500002868428d742457919cbfbc8bce21d2509f0370337030791e4ce8a7368a3dc01c90ef51eb1d0e247a8a57d3b2f1e00573a63d735b0a0b60a302715c48", @ANYRES32=0x0, @ANYBLOB="0600ed007f0500000600ab00050000000600100081030000"], 0x34}, 0x1, 0x0, 0x0, 0x8c0}, 0x20000000) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:23 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x6, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x9d717a73c3c7da08) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000000c0)={0xb10, 0x4, 0x1}) ioperm(0xf800000000000000, 0x5, 0x700) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000200)={0x5, 0x81, 0x2, 0x0, 0x8}) 23:37:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:24 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00'}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in=@initdev, @in=@private}}, {{@in6=@private0}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000140)={0x9, 0x2, 0x1}) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r4 = getpid() tkill(r4, 0x2f) timer_create(0x3, &(0x7f00000001c0)={0x0, 0x0, 0x1, @tid=r4}, &(0x7f0000000200)) 23:37:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = signalfd(r0, &(0x7f0000000040)={[0xdadb]}, 0x8) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000600)=0x1) r2 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$CHAR_RAW_BSZSET(r4, 0x40081271, &(0x7f00000000c0)=0x3) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0xfffffffb, 0x0, 0x0, 0x0, 0x0, "00000000000083bc5fb309490000435cf24700"}) sendto$unix(r1, &(0x7f0000000800)="83ec632c0fbf79e4f183551df48e993f3e4a1f1f2822c0ca3a00bbac4cacbbb063fa3a66e12bf4951f85f7cd95e78f6c407394c50bb1a402b0fe91d264319945c779b8beb4a708686bf2c6b92f6ca54508ca7fbb190e8db9b064a5f0cce5ab963df51165c85a6b9b3a0b66a1f7d17322972d293604fca38338a7671836cc228b776b3ac02a7beb81d78314e06a8bc08605f41cac574780d7a39455fc9d5fecb0a49333c07415584a22feb23ff9f22a27ec9190e57499e412ae1655158b675a4f8e68a56a67d0fad1", 0xc8, 0x20040810, &(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e) r5 = syz_mount_image$nilfs2(&(0x7f0000000100)='nilfs2\x00', &(0x7f0000000140)='./file0\x00', 0x100, 0x7, &(0x7f0000000540)=[{&(0x7f0000000180)="bb540e7122f41aa7f7e7d00fadac85d989c0779c2871150245f424260d8d12e4", 0x20, 0x6}, {&(0x7f00000001c0)="169dc0a87a1bc0b68917a73b2f0972c0cf417006b88ab1679c9b9e69b1516782110c4e86c6e72c454b9da5f19b7db69ff9119fc2ccc827ebcfd6d7ca1b4e380211bfc936dc8e1f0d4ce895b0ad436ce0b78786ec7253aa3b95b191e4c46946c508865266425557304319acc210e4d999bc7c58f76ec062233d1db971c867b24b7dabd08dc892d3a7f4d265eed56d2505beec4685807b", 0x96, 0x3}, {&(0x7f0000000280)="ffaec101d51920a92264d2d44311825f54c9b6169ed5a34386798f5b8237bf3244a9ceb69de6d49b62c82cd4a4ddfbeab401edf9453457c3a1ec012ee0d083f5b6b7b752eb99641232a3e712f1278f81345b3d3debf6b4fa0881aa1b1efd6f0bc1513adbb90b082f0c86b2a69942f7e76d1d460304f71ddac04d080c972c0e4cf576033911cdfaa83082bf3cc3fd5af1989398f6492608a0c4a266ce466f6af554b2c359340df6f48f95f33315490d50c1", 0xb1, 0xaf2}, {&(0x7f0000000340)="18f90e98bb6a551a0f0849b980bd94b0b92ba82578720a520d9bb7b32cc256d7299753b0b9ae8a122f216dc2bc344873e8b73f0865c5a70fb7975e38", 0x3c, 0x3}, {&(0x7f0000000380)="cc93fb6aeda6dc95693134be2c3c4e93f60dc456f0b65b7389ff6af1a11072debd95fc729dce7d952a02313a89e17cd55f5a0dad9fa4d9885c2b0d4ad549e5ad55068e41dffb3ed4434459d08ff0d648f5891dc17a1c334bfc962bb2061a9bc17bd43bf5671a5af899950d8193439a21be4ee2eeccc2b5cb518ba2b30aea3ce427e5c61326fc181e02da4a72e4b0e3d65296af652c961481943aefd5a27a91d16f7ce5b23a90dd1a36b54c4a7bf08ebe0b926669b5094d59330382a27963b8380d29fd5770cb138c70cff70e2353bf353ea12d2a255c7f0f02433124304b5894", 0xe0, 0xd19d}, {&(0x7f0000000480)="07a175cf89ee2e6f4e8324cee3398be41f1749c0825a569ec7b9cf80ce3bc6a9d038cbfbe38d1000dc21752dc908bcdb7054ddce33575f548a5e7708c1b6df569b34bbbd35eea16e962f19267403ea655577a69aee9dc60d59", 0x59, 0x7f}, {&(0x7f0000000500)="a7aed382c32b9400cc41c354be2a6c74a71f49f9f438dfc3503554f41efbfe864a2b1d21cf9df10c06f0fe3b200e9cdc167a5a5402f7b0a46aa88967b354ce", 0x3f, 0x1ff}], 0x2022000, &(0x7f0000000700)=ANY=[@ANYBLOB="bd95bf1f", @ANYRESDEC=0xee01, @ANYBLOB="2c6673636f6e74657874ff73748133183064362aec658564c2423dbfd5e7e4397e42e133a7b831c4d8c921d7532d93ced31bb1cc1a9dc534059460e5e832da949ff7661aeb2abee649c6508c2a8085f3acca6aa698fa2ebcee78352ec500000000000000005087e9313833d83e53636e1d10c2a9adf014dae21a72877b677e2d183bdc61abf5897d56a9c33a1657bd4b28951ec4bf535f109c0ff928e9b21d423bbf899c1a006d5b977e59ebd9b462b097547ef305b574"]) ioctl$F2FS_IOC_DEFRAGMENT(r5, 0xc010f508, &(0x7f0000000640)={0x1, 0x8001}) [ 252.467181] audit: type=1804 audit(1607470642.193:149): pid=12596 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/55/file1/file0" dev="loop3" ino=79 res=1 23:37:24 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x50, r4, 0x8f6f0000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 254.422104] kauditd_printk_skb: 4 callbacks suppressed [ 254.422113] audit: type=1804 audit(1607470644.143:154): pid=12653 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/91/file1/file0" dev="loop0" ino=84 res=1 [ 254.453280] print_req_error: I/O error, dev loop5, sector 0 [ 254.491401] audit: type=1804 audit(1607470644.213:155): pid=12674 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/58/file1/file0" dev="sda1" ino=16125 res=1 23:37:24 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x9, 0x2377, 0x0, 0x4000000, 0xfe, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={0x66b1}, 0x4) 23:37:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000040), 0x4) 23:37:24 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000040)={0x690, 0x1000, 0xf0, 0x480, 0x7fff, 0x6, 0x20, 0x0, {0x6, 0x3, 0x1}, {0x3, 0x8}, {0x7, 0x7f9, 0x1}, {0x5, 0x800, 0x1}, 0x1, 0x80, 0xfffffffd, 0x3b9e, 0x1, 0x441, 0x8, 0x6, 0x40, 0x400, 0x5, 0x5, 0x8, 0x200, 0x3, 0xfafaba474363c427}) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="1000060000001fcd20"], 0x34, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, r4) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000002140)={0x78, 0x0, 0x0, {0x7fff, 0x1, 0x0, {0x1, 0x1, 0x0, 0x0, 0x1, 0x7, 0xfffffffb, 0x3, 0x0, 0xc000, 0x0, 0xee00, r4, 0x7fffffff, 0x8}}}, 0x78) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_GETTIME(r7, 0x80045113, &(0x7f00000000c0)) r8 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r8, 0x2403, 0x6) ioctl$KVM_DIRTY_TLB(r8, 0x4010aeaa, &(0x7f0000000040)={0x14000000000000}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x7]}, 0x8, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0xfffffffd, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000100)={0x1000, 0x10, 0x8, 0x1, 0x8000}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000000c0)={'ipvlan0\x00'}) r4 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) keyctl$get_keyring_id(0x0, 0x0, 0x3197) accept4$llc(r3, 0x0, &(0x7f0000000200), 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x40000, 0x0) copy_file_range(r5, &(0x7f0000000180)=0x1, r4, &(0x7f00000001c0)=0x2, 0x81f8, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r4, 0xc0405665, &(0x7f0000000040)={0x51, 0x1, 0x1000, 0x200, 0x0, 0x6}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd, 0x0, "00b90000000000595fb3ddc93100"}) 23:37:24 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000180)={&(0x7f0000000040), 0x15, &(0x7f0000000140)={&(0x7f0000000000)={0x30, r3, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'veth0_vlan\x00'}}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}}, 0x20000000) close(r1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r5}, &(0x7f00000002c0)=0x8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r7, 0xc0045540, &(0x7f0000000300)=0x6fa4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={r5, 0x3a, "f953b84309e358134262e236ff936b3dd53fd84b50472c8f9368c4bb289ed7fc0b3accce35161aa283bd1c41d29f6ad88834ae9a0519fafa2492"}, &(0x7f0000000040)=0x42) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000240)) 23:37:24 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) pselect6(0x40, &(0x7f0000000200)={0x100000000, 0x8, 0x3f, 0x7f, 0x200, 0xff, 0x4, 0x7}, &(0x7f0000000240)={0x1, 0x3, 0x3f, 0x1, 0x2, 0x401, 0x8, 0x2}, &(0x7f0000000280)={0x1, 0x400, 0x4, 0x7fffffff, 0x1, 0xffffffffffffff01, 0x5, 0xe7}, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={[0x5235]}, 0x8}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x59ec, 0x0, 0x0, 0x0, 0x1, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="99b10000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000ffdbdf252b00000008000300", @ANYRES32=0x0, @ANYBLOB="1e00940000100dff01000020000000090080000c00000000040001000000000034002a0006020300bd060802110000002a0105831f00000effffffffffff000400007930000008000000080201000001020000001e00940096e60e0900000000000000e00007000c0000000800ffff0000020000"], 0x90}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000004) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:24 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) ioctl$TCSETSW(r1, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xd5d, 0xb, "00000000000000595fb3ddc93100"}) 23:37:24 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xce20, 0x0, @mcast1}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e22, 0x2, @local, 0x2}, {0xa, 0x4e23, 0x100, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0xd4f0, [0xb0, 0x6f6, 0x3, 0x4, 0x5c1a, 0x0, 0x1, 0x100]}, 0x5c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$SNDRV_PCM_IOCTL_LINK(r3, 0x40044160, &(0x7f0000000140)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x3f}, @void, @val={0xc, 0x99, {0xf600, 0x3d}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x20000004) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r3, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x240040, 0x4) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x78) [ 255.180720] sctp: [Deprecated]: syz-executor.4 (pid 12715) Use of struct sctp_assoc_value in delayed_ack socket option. [ 255.180720] Use struct sctp_sack_info instead [ 255.346570] audit: type=1804 audit(1607470645.063:156): pid=12729 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/59/file1/file0" dev="loop3" ino=85 res=1 [ 256.083912] sctp: [Deprecated]: syz-executor.4 (pid 12725) Use of struct sctp_assoc_value in delayed_ack socket option. [ 256.083912] Use struct sctp_sack_info instead 23:37:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6c", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:25 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) socketpair(0x8, 0x3, 0x7f, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x3, 0x9}, 0x8) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x11, 0x800000003, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r6}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x4, 0x3, 0x800f, 0xff, 0x2, 0x8, 0xbc0, 0x7, r6}, &(0x7f0000000140)=0x20) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x4, 0x0, "1f0000000000000000000000c700"}) fcntl$setpipe(r0, 0x407, 0x10200000000000) 23:37:25 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r2, &(0x7f00000000c0)) 23:37:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:25 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000340)={{r1}, 0x0, 0x2, @unused=[0x1ff, 0x41, 0x5, 0x5], @subvolid=0x20}) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000300)={'veth1_virt_wifi\x00', {0x2, 0x0, @multicast2}}) dup2(r2, r2) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x42, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x2000, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001340)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000bc", @ANYRES16=r1, @ANYBLOB="000125bd7000fedbdf250800000008000800ac1414aa080008000000000008000c0002000000100001002f6465762f726164836f230008000c000200000008000c00637b6fcb"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f00000000c0)) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) [ 256.220797] audit: type=1804 audit(1607470645.143:157): pid=12732 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/92/file1/file0" dev="loop0" ino=86 res=1 23:37:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x3ff, 0x0, 0x0, 0x2, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x140, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000000c0)={0x1, 0x30000000, 0x7, 0x4000, r2}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = dup2(r1, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_S390_UCAS_MAP(r5, 0x4018ae50, &(0x7f0000000040)={0x7fff, 0x8, 0x9}) ioctl$FBIO_WAITFORVSYNC(r5, 0x40044620, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$6lowpan_enable(r7, &(0x7f0000000180)='1', 0x1) ioctl$SNDCTL_DSP_SETTRIGGER(r4, 0x40045010, &(0x7f0000000140)=0x2) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x2000, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:26 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x8, 0x3b, 0x7, 0x2, 0x1, 0x58], 0x6, 0x80000, 0x0, 0xffffffffffffffff}) r5 = signalfd(r1, &(0x7f0000000100)={[0xea]}, 0x8) mq_getsetattr(r5, &(0x7f0000000140)={0x0, 0x1ff, 0x5, 0x400}, &(0x7f0000000180)) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) [ 256.277858] sctp: [Deprecated]: syz-executor.1 (pid 12754) Use of struct sctp_assoc_value in delayed_ack socket option. [ 256.277858] Use struct sctp_sack_info instead 23:37:26 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0xf}, 0x3ff}}}, &(0x7f0000000300)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r2, 0xb1, "1e93d819d358e301d692e38787bda3429ddd692580a1e240aefbd824f506bb216412cf592343d2095eab1b70e85ecb4be3e6b09347b1dbcd659fe09030bdcc88572e0c7cfaa13c5ab602b62b5d0cb94421c51ca315a35e3c3741faec16c62a3a34f1585dd79142b5c825285ce54c257c3520f0b0ac03bc58380defab3f64d9180d143a26f3ab45e7b9a862e2f310ac19d08b55561360e919292f24d44df1f0a5984049aba6f07d2122f652889452f2d918"}, &(0x7f0000000400)=0xb9) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x7, 0x0, 0x2, 0x0, 0x8, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_WDS_PEER(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @random="77a2e481e95d"}, @NL80211_ATTR_MAC={0xa, 0x6, @random="a78b8f8d3157"}, @NL80211_ATTR_MAC={0xa, 0x6, @random="3bdbaf1900ec"}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000000}, 0x20004000) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x1ffffffc, 0x0, 0x40000, 0x0, 0xc, "0000000000bd0000000200004bc100"}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 23:37:26 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0xa, 0x0, 0x2, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:26 executing program 2: r0 = socket$inet6(0xa, 0x8, 0x8000) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xff, 0x281) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x10) 23:37:26 executing program 4: ioctl$CHAR_RAW_REPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000000c0)={0x8001, 0x5, 0x0, [{0x3, 0x8, 0x9, 0x3, 0xff, 0x4c}, {0x2, 0x3ff, 0x5, 0x5, 0x7, 0x9, 0xfa}, {0x81, 0x8000, 0x8, 0x8, 0x0, 0x1f, 0x4}, {0xf368, 0x8, 0x2, 0x2, 0x8, 0x1, 0x61}, {0x0, 0x9, 0xffffffffffffffff, 0x1, 0x0, 0xf3}]}) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, 0xffffffffffffffff) setsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000240)="fbc4c566300b3f5a4abcc7cf50c9c2d66546c8cea04543f5a81261b8121a68114a6b30294a692fdfaf2fecbf0bafffd61e0e2e572265f058e66fc4fa067d7339e78882b66c8828c74a26bf7e5deb115990807d0fd9b68539a88c46d09b28710fbf5b9a9cb8b9b91bbd116174b5030f6eb1abb2c805962c102fe545d48d95c2eb497b11668d2cbdeeccc1a934c46580ecac03365bfbbc1cf4daa0442d3b0793ba1c8491", 0xa3) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) dup(0xffffffffffffffff) [ 256.409076] audit: type=1804 audit(1607470646.133:158): pid=12764 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/60/file1/file0" dev="loop3" ino=87 res=1 23:37:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:26 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:26 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) [ 257.235270] audit: type=1804 audit(1607470646.323:159): pid=12784 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/93/file1/file0" dev="loop0" ino=88 res=1 23:37:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x3c}}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x80) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000440)={'dummy0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000000001300"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000050021"], 0x28}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000080)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@private=0xa010102, 0x4e22, 0x400, 0x4e20, 0x9, 0x2, 0x20, 0x20, 0x2f, r6, 0xee01}, {0x8, 0x4, 0x3ff, 0x101, 0x5, 0x1, 0x2, 0x5}, {0x9, 0x4, 0x4, 0x731}, 0x0, 0x6e6bbe, 0x1, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0x6c}, 0x2, @in=@local, 0x0, 0x1, 0x2, 0x5, 0x1, 0x4}}, 0xe8) listen(r0, 0x6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000001c0)={0x7}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r3, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$ETHTOOL_MSG_PAUSE_GET(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x20008080}, 0x2000c054) [ 257.443025] audit: type=1804 audit(1607470647.003:160): pid=12798 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/61/file1/file0" dev="loop3" ino=89 res=1 23:37:27 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x400, 0x0, 0x800000, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67be2b4310"}) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000240)=0x5, &(0x7f0000000280)=0x1) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev\x00') write$char_usb(r1, &(0x7f0000000140)="2b9bd87ae94ee4bba9ddc3c88820da47a0080a9a37519dcc8ccc8e8b08c1f9dfa936265885b3618d0d116d1949020ffe84dbcb7ea03c8edfa6439852ea7345bf1ed1b3711aecc2fed58d432abddf8f8c679a62c84f675040d79e277f5557d71d3ed1e267302672e9df8ca5ac374b550fcc059833c7ec05f678e04dc3f721bcda184ff50bd81439cff818f3dc4b", 0x8d) renameat(r1, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 23:37:27 executing program 4: ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000180)=0x77) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x36000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x83, 0x5c, 0x8000, 0x1, 0x1a, 0x7ff, 0x8}, &(0x7f00000003c0)=0x9c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000400)={r3, 0x3}, &(0x7f00000018c0)=0x8) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) msgget(0x2, 0x0) listen(r2, 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fe8000000000000000000000000000bb1a8100000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaaaa500d1ab3fb8686dd6000000000180600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600014009005000002040000"], 0x0) r4 = dup2(r1, r1) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x81200}, 0xc, &(0x7f0000000280)={&(0x7f0000001500)=ANY=[@ANYBLOB="bc030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x3bc}, 0x1, 0x0, 0x0, 0x800}, 0x4014844) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETSW(r4, 0x5412, &(0x7f0000000080)={0x80000, 0x0, 0x5, 0x0, 0x1, "00000000000000595fb3ddc93100"}) msgrcv(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffffffffffff00"/4102], 0x1008, 0x0, 0x2000) getpeername$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{}, [@netrom, @remote, @default, @remote, @bcast, @default, @null]}, &(0x7f0000000140)=0x48) 23:37:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x80006) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$getownex(r5, 0x10, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 257.575144] audit: type=1804 audit(1607470647.303:161): pid=12816 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/62/file1/file0" dev="loop3" ino=90 res=1 23:37:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x80800, 0x0) ioctl$TCSETSW(r1, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:27 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0xb, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x1e1, 0x20, &(0x7f00000000c0)="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"}) ioctl$TCSETSW(r1, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x10, "000000000000b3ddc93100"}) 23:37:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x4, 0x1, 0x401, 0x0, 0x0, {0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000040}, 0x28000000) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000140)=""/35, &(0x7f0000000180)=0x23) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e00, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) 23:37:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009c, 0x0, 0x0, 0x4000000, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000595fb3ddc9310000200000001500"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 23:37:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c00601e4a0f1b9c2d386d3b9267bed55929fef397cc8bb4ee8d2714da5ceaf07979d8911cc26e3bcc7e7e0322b12fe1122069bc5e777558a7bfaf9dc4acb4e1f10fe4d6082ec79e4700000000000000000000000000008475ef4b6002fc09e5e2a6714823d718aa62ac17a1b54755285e2aa61b30579981beb9c93a2b76dd7cf3bf29dfcb9cad7293e4f099f202023bcbd7eb348080e85c8ef6f4f6e6a71794e6dd8a193473250a7e3e84f954dffc05536cd809184b18dcd2434a33c917d370e900d1ae50fadcd6b4dc0bd6c27f4caba6122e80bb0b06beb64607d7c145fe9479ca42672afcd7682d06d5c50374e6b38731a005a13370424fd523b4"]) sendfile(r1, r2, 0x0, 0x1c500) [ 257.826754] audit: type=1804 audit(1607470647.553:162): pid=12852 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir908817657/syzkaller.WdBYt7/63/file1/file0" dev="loop3" ino=91 res=1 23:37:27 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = socket(0x11, 0x800000003, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e24, 0x8, @mcast2, 0x6517}}, 0x3c, 0x4}, 0x90) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) gettid() 23:37:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:27 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:27 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) 23:37:27 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x1, 0x80400, 0x0, 0xfffffffa, 0x1, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000040)) 23:37:27 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 258.028989] sctp: [Deprecated]: syz-executor.1 (pid 12880) Use of struct sctp_assoc_value in delayed_ack socket option. [ 258.028989] Use struct sctp_sack_info instead 23:37:27 executing program 5: setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xff}, 0x8) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x81, 0x480000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000140)={r2}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4801}, 0x4000) [ 258.118669] audit: type=1804 audit(1607470647.843:163): pid=12872 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir905762435/syzkaller.sMCwCp/95/file1/file0" dev="loop0" ino=92 res=1 23:37:28 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000012c0), &(0x7f0000001300)=0x4) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x1a, &(0x7f00000001c0)=ANY=[@ANYBLOB="f3"], 0x348) bind$inet6(r3, &(0x7f00000006c0), 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000540)={0x0, 0xffffffffffffff76, "7a3ac21c9eb09d00e5f704ecf4d91970bbeb161830d27c0c3a0fa4683375d40209e93478e62bc942c0cef67c3c31e7909af1aaf16e59920d46319fe36dbee01ce5eabea15ac5c2335fea456ae0462f483313f46b453fdcca648763dc67ea996629593b36ae36dcad0f352ab58266a366bb7e5587600a94633601bf5206cdfbab3db974c54dc984a92b72e12ed075bebc3cba58e520da5f72aea04aecea92089057057e88dee1c7c9"}, &(0x7f0000000140)=0xffc2) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$VFIO_CHECK_EXTENSION(r5, 0x3b65, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_crypto(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200100001200200026bd7000ffdbdf25736861332d3232340000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000002400000000000000000000080001007f0000000800010006000000080001000900000008000100000001000800010007000000080001000100000008000100018000000800010004000000"], 0xffdc}}, 0x8000) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000280)=""/4096, 0x1000) write$FUSE_BMAP(r5, &(0x7f0000001280)={0x18, 0x0, 0x0, {0xc71a3f8000000000}}, 0x18) 23:37:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x3, 0x19, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0xffff, 0x2) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x240, 0x0) dup2(r2, r5) r6 = dup2(r4, r4) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) connect$inet6(r7, &(0x7f00000001c0)={0xa, 0x4e22, 0x4325cd19, @empty, 0x6}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000100)) pread64(r6, &(0x7f0000000040)=""/188, 0xbc, 0x8) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x2b5) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r3}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r1, r2, 0x0, 0x1c500) 23:37:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x4}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:37:28 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$CHAR_RAW_REPORTZONE(r6, 0xc0101282, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r2]) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000180)={0x73622a85, 0x101, 0x3}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000040)={0x1000, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 258.763594] sctp: [Deprecated]: syz-executor.1 (pid 12880) Use of struct sctp_assoc_value in delayed_ack socket option. [ 258.763594] Use struct sctp_sack_info instead 23:37:28 executing program 4: syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$l2tp(0x2, 0x2, 0x73) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) 23:37:28 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') syz_usbip_server_init(0x3) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x30, r4, 0x7, 0x0, 0x0, {0x2, 0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @empty=[0x2]}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r4, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1f}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}]}, 0x44}}, 0x8000) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x8) [ 258.958467] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(6) [ 258.964574] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) 23:37:28 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f00000000c0)={0x9, 0x7f, 0x1}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) 23:37:28 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x18, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000240)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f0000000040)) fcntl$setlease(r4, 0x400, 0x1) [ 259.174773] vhci_hcd: connection closed [ 259.176031] vhci_hcd: stop threads 23:37:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) accept4(r1, &(0x7f0000000080)=@hci, &(0x7f0000000100)=0x80, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) listen(r0, 0xf5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "995d095abb885c67", "ceef7ef1ff677efc4088cd9a5ccdcd99", "11d5e468", "65f6c13ed0502017"}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) [ 259.347811] vhci_hcd: release socket [ 259.384211] vhci_hcd: disconnect device [ 259.441285] usb 11-1: new high-speed USB device number 2 using vhci_hcd [ 259.454642] usb 11-1: enqueue for inactive port 0 [ 259.484263] usb 11-1: enqueue for inactive port 0 [ 259.518318] usb 11-1: enqueue for inactive port 0 [ 259.614497] vhci_hcd: vhci_device speed not set 23:37:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r0, 0x0, 0xd2957e9, r4}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x1c500) 23:37:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 23:37:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000080)=""/128) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) prctl$PR_GET_TIMERSLACK(0x1e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x10000, 0x0) 23:37:29 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x8000009e, 0x0, 0x0, 0x0, 0x0, "f76cdb7b20de61578f7a3ec6a1cb67c02b4300"}) ioctl$TCSETSW(r0, 0x5412, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000595fb3ddc93100"}) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) 23:37:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400400, 0x20) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r3, &(0x7f0000001400)="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", 0x2b5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@local}}, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ubifs(&(0x7f0000000040)='ubifs\x00', &(0x7f0000000140)='./file1\x00', 0x1000, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0ec3e32e8ca84a3c02e443da30a59dbfb0364c489f64f02f741baf7fe889c0ca7911865985e9b4acdfc73aadd77138a458239cf5daef8eefaa7174212de2d01bae7de6ae5b6c8f2b6f05a84d89488709ec9a54b5de0f78b4bc6627eafadc2d2554ebbee9a69a0f0567ef7b5d533e4f16a97b499f49e23498529445aa0f693fa6ac07d75271286ebdb39a", 0x8a, 0x2}, {&(0x7f0000000300)="e578782375724db8ea5c913dfad8353c3872026e01269fcaf71dc538a2d367b074a2b1c67725a933d0bcc5f4814f5235426b1da0c57811d632e611a1b85d26c2f8d0e1561676f5", 0x47, 0x3ff}, {&(0x7f00000004c0)="fbb1769fcb874e7b77d3dd585693faae4f5063cc67a52aa9ded04f5b51d38ceecf85923e52871f5747eba693f10e33ded52ef75c78fae78e2e561b35800859b032806590eff7de9313c9a2972d379c19235b41d265340e14d36af887184135347c17e08a1d8e94074107ec287533499d227b58d7c933f96cfa8822d9fb060a3177b42c1b5e5e8ab1ba07911d8510b600518de8e31a0309bb61516e081a7853c8ce52c5f31dbf092c4776457cbd51e0a0ca02259550b737", 0xb7}], 0x102001, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000840)={r1, 0x0, 0xd2957e9, r5}) syz_mount_image$adfs(0x0, 0x0, 0x6, 0x0, 0x0, 0x4408, &(0x7f0000000880)=ANY=[@ANYBLOB='msdos\x00,system.posix_acl_default\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB="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"]) sendfile(r3, r4, 0x0, 0x1c500) [ 259.683633] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(7) [ 259.689479] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 259.760210] vhci_hcd: connection closed [ 259.760310] BUG: unable to handle kernel NULL pointer dereference at 000000000000001c [ 259.772347] IP: kthread_stop+0x47/0x640 [ 259.772352] PGD 5f029067 P4D 5f029067 PUD 5f02a067 PMD 0 [ 259.772365] Oops: 0002 [#1] PREEMPT SMP KASAN [ 259.772369] Modules linked in: [ 259.772378] CPU: 1 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.211-syzkaller #0 [ 259.772382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.772391] Workqueue: usbip_event event_handler [ 259.772397] task: ffff8880b5ff2140 task.stack: ffff8880b5ff8000 [ 259.772403] RIP: 0010:kthread_stop+0x47/0x640 [ 259.772407] RSP: 0018:ffff8880b5fffc70 EFLAGS: 00010297 [ 259.772412] RAX: ffff8880b5ff2140 RBX: 0000000000000001 RCX: 0000000000000000 [ 259.772416] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000286 [ 259.772419] RBP: fffffffffffffffc R08: ffffffff8b991520 R09: 0000000000000000 [ 259.772424] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888237db08d8 [ 259.772428] R13: ffff888237db08c8 R14: fffffbfff1924130 R15: ffffffff89857e20 [ 259.772434] FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 [ 259.772439] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 259.772443] CR2: 000000000000001c CR3: 000000005f028000 CR4: 00000000001406e0 [ 259.772452] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 259.772456] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 259.772459] Call Trace: [ 259.772470] vhci_shutdown_connection+0x12a/0x240 [ 259.772478] ? mark_held_locks+0xa6/0xf0 [ 259.772487] ? kfree+0x14a/0x250 [ 259.772494] ? event_handler+0x141/0x4a0 [ 259.772500] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 259.772507] event_handler+0x1c3/0x4a0 [ 259.772518] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 259.772527] process_one_work+0x793/0x14a0 [ 259.772536] ? work_busy+0x320/0x320 [ 259.772541] ? worker_thread+0x158/0xff0 [ 259.772552] ? _raw_spin_unlock_irq+0x24/0x80 [ 259.772560] worker_thread+0x5cc/0xff0 [ 259.772569] ? rescuer_thread+0xc80/0xc80 [ 259.772576] kthread+0x30d/0x420 [ 259.772583] ? kthread_create_on_node+0xd0/0xd0 [ 259.772590] ret_from_fork+0x24/0x30 [ 259.772597] Code: 00 65 8b 1d bc 17 c9 7e 83 fb 07 0f 87 5b 04 00 00 e8 be d5 1e 00 89 db 48 0f a3 1d 8c 42 d0 08 0f 82 a2 03 00 00 e8 a9 d5 1e 00 ff 45 20 48 8d 7d 24 48 b8 00 00 00 00 00 fc ff df 48 89 fa [ 259.772704] RIP: kthread_stop+0x47/0x640 RSP: ffff8880b5fffc70 [ 259.772706] CR2: 000000000000001c [ 259.772715] ---[ end trace 6b807e073f420c2c ]--- [ 259.772718] Kernel panic - not syncing: Fatal exception [ 259.773090] Kernel Offset: disabled [ 260.012088] Rebooting in 86400 seconds..