l$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[], 0x8) setsockopt$inet6_int(r1, 0x29, 0x4, &(0x7f0000000100)=0x8, 0x4) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 05:17:56 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:17:56 executing program 1: [ 1084.654622][T19202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:56 executing program 2: 05:17:56 executing program 2: [ 1084.716122][T19210] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:17:56 executing program 1: 05:17:56 executing program 2: [ 1084.814696][T19217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1084.834714][T19217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:59 executing program 2: 05:17:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:17:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'macvlan1\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x18, 0x0, 0x0, "5b4b938a9285"}}) 05:17:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:17:59 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:17:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000), 0x4) 05:17:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) [ 1087.687241][T19233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:59 executing program 1: pipe(&(0x7f0000000700)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000006, 0x11, r0, 0x0) 05:17:59 executing program 3: pipe(0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') 05:17:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x6, 0x10000}, 0x40) r1 = epoll_create(0xa22) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) [ 1087.730585][T19233] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:17:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000025c0)=[{{&(0x7f00000002c0)={0x2, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000002740)=[@tclass={{0x14}}, @hopopts={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0x10000}}], 0x48}}], 0x2, 0x0) 05:17:59 executing program 2: socketpair(0x10, 0x2, 0x0, &(0x7f00000004c0)) [ 1087.843454][T19255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1087.885519][T19255] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000025c0)=[{{&(0x7f00000002c0)={0x2, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000002740)=[@tclass={{0x14}}, @hopopts={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0x10000}}], 0x48}}], 0x2, 0x0) 05:18:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:02 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0xfffffe7f) 05:18:02 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000480)='devlink\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r1, &(0x7f0000002a80)={&(0x7f00000028c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002880)={0x14, r0, 0x1}, 0x14}}, 0x0) 05:18:02 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7f80, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @loopback}}}}) 05:18:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x24, &(0x7f0000000000), 0x4) [ 1090.740162][T19274] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1090.772541][T19274] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:02 executing program 2: 05:18:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:02 executing program 1: 05:18:02 executing program 3: 05:18:02 executing program 1: [ 1090.902776][T19295] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1090.936459][T19295] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:05 executing program 2: 05:18:05 executing program 3: 05:18:05 executing program 1: 05:18:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:05 executing program 1: 05:18:05 executing program 3: 05:18:05 executing program 2: [ 1093.804795][T19312] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:05 executing program 3: 05:18:05 executing program 1: [ 1093.948028][T19327] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:08 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 05:18:08 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000ec0)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 05:18:08 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@default, @bcast, @default, @default, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="b9", 0x1}], 0x1, &(0x7f00000002c0)=[@mark={{0x14}}, @mark={{0x14}}], 0x30}}], 0x2, 0x0) 05:18:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:08 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000007fc0)={&(0x7f0000006800)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="640000000000000011"], 0x68}, 0x0) 05:18:08 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000080)) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8901, &(0x7f0000000080)) 05:18:08 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1096.861987][T19345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:08 executing program 2: pselect6(0x0, 0x0, &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)={0x77359400}, &(0x7f00000008c0)={&(0x7f0000000880)={[0x11b6f467]}, 0x8}) 05:18:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000007fc0)={&(0x7f0000006800)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="64000000000000000000000001"], 0x68}, 0x0) [ 1096.965909][T19345] syz-executor.4 (19345) used greatest stack depth: 9864 bytes left [ 1097.016759][T19366] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1097.056809][ T34] audit: type=1804 audit(1605158288.579:390): pid=19361 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2035/cgroup.controllers" dev="sda1" ino=16376 res=1 errno=0 [ 1097.082478][T19366] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:11 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@default, @bcast, @default, @default, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=[@mark={{0x14}}, @mark={{0x14}}], 0x30}}], 0x1, 0x0) 05:18:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001480)={'gre0\x00', &(0x7f00000013c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}}}}) 05:18:11 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:11 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:11 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@dev}) 05:18:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @ethernet={0x0, @local}, @l2={0x1f, 0x0, @any, 0x0, 0x2}}) [ 1099.899239][T19388] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1099.928993][T19388] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:11 executing program 2: socketpair(0x1d, 0x0, 0x0, &(0x7f00000001c0)) 05:18:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000180)) 05:18:11 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1099.978457][ T34] audit: type=1804 audit(1605158291.499:391): pid=19386 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2036/cgroup.controllers" dev="sda1" ino=16315 res=1 errno=0 05:18:11 executing program 1: pselect6(0x40, &(0x7f0000000780), &(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x77359400}, &(0x7f00000008c0)={&(0x7f0000000880)={[0x11b6f467]}, 0x8}) [ 1100.072068][T19405] can: request_module (can-proto-0) failed. [ 1100.098053][T19405] can: request_module (can-proto-0) failed. 05:18:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x8f, &(0x7f0000000100)=""/143, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1100.113797][T19413] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1100.167709][T19418] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:14 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:14 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x1}, 0x20000010) 05:18:14 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:14 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, 0x0, 0x0) 05:18:14 executing program 2: syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2f, &(0x7f0000000200)=[{&(0x7f0000010000)="02020202020202027468697320697320616e206f6366733220766f6c756d650002020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d6500020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d65000202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d650002020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202024f43465356320000c799ae24ffffffff0000000000040000000000000000000000000000000000000000000031000000000000000000000047c3655f0000000047c3655f00000000000000000000000002000000000000000000000000000000c799ae24000000000000000000000000000000000000000000000000000000006ccfc68ac9030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a0000001400000000000000000047c3655f00000000000000000300000058bf00000700000041000000000000004200000000000000090000000e00000001000000cf4462192000"/1312, 0x520}, {&(0x7f0000010600)="00000000000000000000000000000000b014d7aa9d934310b5439a1a00e98e12000000000000000000000000000000000000000000000000000100001752f5cea071f700483de78000"/96, 0x60, 0x540}, {&(0x7f0000010700)="47524f5550303100c0010004a7010000c799ae2400000000000000000000000047000000000000002000000000000000b008a148390300000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100"/160, 0xa0, 0x4000}, {&(0x7f0000010800)="47524f5550303100c00120010e010000c799ae240000000000000000000000004400000000000000400000000000000064b18eb1010100000000000000000000ffff0300"/96, 0x60, 0x8000}, {&(0x7f0000010900)="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", 0x100, 0x8200}, {&(0x7f0000010a00)="494e4f4445303100c799ae24ffff0200000000000100000000000000000000000002000000000000ed4103001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000042000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000c294b949b101000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130001000000000000000000000000000000010000006001000000000000", 0xe0, 0x8400}, {&(0x7f0000010b00)="494e4f4445303100c799ae24ffff0300000000000000000000000000000000000000000000000000a48101001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000043000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000b52a0e62a2040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001300"/224, 0xe0, 0x8600}, {&(0x7f0000010c00)="494e4f4445303100c799ae24ffff0400000000000900000000000000000000000040020000000000a48101009104000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000044000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000e067f38a890000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001200000020010000090020001300010000000000000000000e010000200100004000000000000000", 0xe0, 0x8800}, {&(0x7f0000010d00)="494e4f4445303100c799ae24ffff0500000000000100000000000000000000000040000000000000a48101001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000045000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000b39f85a84d03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130001000000000000000000000000000000010000008042000000000000", 0xe0, 0x8a00}, {&(0x7f0000010e00)="494e4f4445303100c799ae24ffff0600000000000800000000000000000000000000020000000000a48101001102000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000046000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000cc4155ace604000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130001000000000000000000000000000000080000008001000000000000", 0xe0, 0x8c00}, {&(0x7f0000010f00)="494e4f4445303100c799ae24ffff0700000000000004000000000000000000000000000100000000a48101009104000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000047000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000f68f5088b90100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005902000000040000000e0100130001000000000000000000a7010000000400002000000000000000", 0xe0, 0x8e00}, {&(0x7f0000011000)="494e4f4445303100c799ae24ffff080000000000010000000000000000000000000e000000000000a48101001110000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000048000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000b2fce01e110600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000100000000000000000000000000000001000000a042000000000000", 0xe0, 0x9000}, {&(0x7f0000011100)="494e4f4445303100c799ae24ffff090000000000010000000000000000000000000e000000000000a48101001110000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000049000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000e1bf8312300200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000100000000000000000000000000000001000000e042000000000000", 0xe0, 0x9200}, {&(0x7f0000011200)="494e4f4445303100c799ae24ffff0a00000000000000000000000000000000003801000000000000ed4102001100000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000004a000000000000000000000000000000c799ae2400000000000000000000000000000000000001000000000000000000868bcc4eb4070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038010000000000004a00000000000000100001022e0000004200000000000000280102022e2e00"/256, 0x100, 0x9400}, {&(0x7f0000011300)="494e4f4445303100c799ae24ffff0b00000000000000000000000000000000000000000000000000a48101009104000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000004b000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000ee74cc43710600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400020001300"/224, 0xe0, 0x9600}, {&(0x7f0000011400)="494e4f4445303100c799ae24ffff0c00000000004000000000000000000000000000100000000000a48101009104000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000004c000000000000000000000000000000c799ae240000000000000000000000000000000000000000000000000000000073fc9f7391050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000008000040002000130001000000000000000000fe070000000800002043000000000000", 0xe0, 0x9800}, {&(0x7f0000011500)="494e4f4445303100c799ae24ffff0d00000000000002000000000000000000000000800000000000a48101001101000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000004d000000000000000000000000000000c799ae240000000000000000000000000000000000000000000000000000000007d6241b2b06000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130001000000000000000000000000000000000200008002000000000000", 0xe0, 0x9a00}, {&(0x7f0000011600)="494e4f4445303100c799ae24ffff0e00000000000000000000000000000000000000000000000000a4810100d100000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000004e000000000000000000000000000000c799ae240000000000000000000000000000000000000000000000000000000083c4ac7846060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300100"/224, 0xe0, 0x9c00}, {&(0x7f0000011700)="494e4f4445303100c799ae24ffff0f00000000000000000000000000000000000000000000000000a48101001108000047c3655f0000000047c3655f0000000047c3655f0000000000000000000000004f000000000000000000000000000000c799ae24000000000000000000000000000000000000000000000000000000006475ca2aea03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002700"/224, 0xe0, 0x9e00}, {&(0x7f0000011800)="494e4f4445303100c799ae24ffff1000000000000100000000000000000000000004000000000000a48101001110000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000050000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000a0442037120600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000100000000000000000000000000000001000000c042000000000000", 0xe0, 0xa000}, {&(0x7f0000011900)="494e4f4445303100c799ae24ffff1100000000000100000000000000000000000004000000000000a48101001110000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000051000000000000000000000000000000c799ae240000000000000000000000000000000000000000000000000000000066ef9c863402000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130001000000000000000000000000000000010000000043000000000000", 0xe0, 0xa200}, {&(0x7f0000011a00)="4200000000000000100001022e0000004200000000000000100002022e2e0000430000000000000018000a016261645f626c6f636b730000440000000000000020001201676c6f62616c5f696e6f64655f616c6c6f630000450000000000000014000801736c6f745f6d617046000000000000001800090168656172746265617400000047000000000000001c000d01676c6f62616c5f6269746d6170000000480000000000000018000b016171756f74612e7573657200490000000000000018000c016171756f74612e67726f75704a000000000000001c000f026f727068616e5f6469723a30303030004b0000000000000020001101657874656e745f616c6c6f633a303030300000004c000000000000001c001001696e6f64655f616c6c6f633a303030304d0000000000000018000c016a6f75726e616c3a303030304e000000000000001c0010016c6f63616c5f616c6c6f633a303030304f00000000000000200011017472756e636174655f6c6f673a3030303000000050000000000000001c0010016171756f74612e757365723a303030305100000000000000280011016171756f74612e67726f75703a3030303000000000000000000000000000000000000000400000000000000044495254524c310000000000000000000000000000000000600100000000000042000000000000004cf7a9b943050000", 0x200, 0x2c000}, {&(0x7f0000011c00)="c03b39980000000400000000000002000000400000000002000000010000000100000000000000000000000000000000b014d7aa9d934310b5439a1a00e98e120000000100"/96, 0x60, 0x50000}, {&(0x7f0000011d00)="7024f50c00000000803a0900803a0900102700000700000000000000060000003801000000000000ed4103001100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000041000000000000000000000000000000c799ae2400000000000000000000000000000000000001000000000000000000e7d3a56c52020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038010000000000004100000000000000100001022e0000004100000000000000280102022e2e00"/256, 0x100, 0x854000}, {&(0x7f0000011e00)="000000000000000000000000000000000000000000000000cd3bfd893e0600000200"/64, 0x40, 0x8541e0}, {&(0x7f0000011f00)="000000000000000000000000000000000000000000000000d73cb06d050000000300"/64, 0x40, 0x8543e0}, {&(0x7f0000012000)="000000000000000000000000000000000000000000000000ffe7c27d060000000400"/64, 0x40, 0x8545e0}, {&(0x7f0000012100)="00000000000000000000000000000000000000000000000027e69e0c060000000500"/64, 0x40, 0x8547e0}, {&(0x7f0000012200)="0000000000000000000000000000000000000000000000000f3dec1c050000000600"/64, 0x40, 0x8549e0}, {&(0x7f0000012300)="00000000000000000000000000000000000000000000000077507b2c03000000000000000000000001000000000000000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x854be0}, {&(0x7f0000012400)="000000000000000000000000000000000000000000000000d35683df02010000", 0x20, 0x854de0}, {&(0x7f0000012500)="c024f50c0000000001000000010000000200"/32, 0x20, 0x858000}, {&(0x7f0000012600)="00000000000000000000000000000000000000000000000087544ce5bc000000", 0x20, 0x8581e0}, {&(0x7f0000012700)="000000000000000000000000000000000000000000000000878a554d00000000", 0x20, 0x8583e0}, {&(0x7f0000012800)="7124f50c00000000803a0900803a090010270000070000000000000006000000000e000000000000a48101001110000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000048000000000000000000000000000000c799ae2400000000000000000000000000000000000000000000000000000000b2fce01e110600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000100000000000000000000000000000001000000a042000000000000", 0xe0, 0x85c000}, {&(0x7f0000012900)="000000000000000000000000000000000000000000000000c7467bd3e60200000200"/64, 0x40, 0x85c1e0}, {&(0x7f0000012a00)="000000000000000000000000000000000000000000000000d73cb06d050000000300"/64, 0x40, 0x85c3e0}, {&(0x7f0000012b00)="000000000000000000000000000000000000000000000000ffe7c27d060000000400"/64, 0x40, 0x85c5e0}, {&(0x7f0000012c00)="00000000000000000000000000000000000000000000000027e69e0c060000000500"/64, 0x40, 0x85c7e0}, {&(0x7f0000012d00)="0000000000000000000000000000000000000000000000000f3dec1c050000000600"/64, 0x40, 0x85c9e0}, {&(0x7f0000012e00)="00000000000000000000000000000000000000000000000077507b2c03000000000000000000000001000000000000000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x85cbe0}, {&(0x7f0000012f00)="000000000000000000000000000000000000000000000000d35683df02010000", 0x20, 0x85cde0}, {&(0x7f0000013000)="c124f50c0000000001000000010000000200"/32, 0x20, 0x860000}, {&(0x7f0000013100)="000000000000000000000000000000000000000000000000af8f3ef5bf000000", 0x20, 0x8601e0}, {&(0x7f0000013200)="000000000000000000000000000000000000000000000000878a554d00000000", 0x20, 0x8603e0}, {&(0x7f0000013300)="47524f555030310000010008fe070000c799ae240000000000000000000000004c000000000000002043000000000000370a53400601000000000000000000000300"/96, 0x60, 0x864000}, {&(0x7f0000013400)="494e4f4445303100c799ae2400000100000000000000000000000000000000003801000000000000ed4102000100000047c3655f0000000047c3655f0000000047c3655f00000000000000000000000021430000000000000000000000000000c799ae2400000000000000000000000000000000000001000000000000000000bcfae5e8ab060000000000000000000000000000000000002043000000000000000000000000000000000000000000000000000000000000000000000000000038010000000000002143000000000000100001022e0000004100000000000000280102022e2e00"/256, 0x100, 0x864200}], 0x0, &(0x7f0000013500)) 05:18:14 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f00000001c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x8, 0x56a, 0x97, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x20, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x4, {0x9}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x2}}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x5}}]}}}]}}]}}, &(0x7f0000000100)={0x0, 0x0, 0x19, &(0x7f0000000080)=ANY=[@ANYBLOB="050f190003071002"]}) [ 1102.951185][T19435] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1102.996324][T19443] (syz-executor.2,19443,1):ocfs2_parse_options:1481 ERROR: Invalid heartbeat mount options [ 1103.033820][T19443] (syz-executor.2,19443,1):ocfs2_fill_super:1190 ERROR: status = -22 05:18:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1103.082732][ T34] audit: type=1804 audit(1605158294.610:392): pid=19437 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2037/cgroup.controllers" dev="sda1" ino=16371 res=1 errno=0 [ 1103.141953][T19443] (syz-executor.2,19443,1):ocfs2_parse_options:1481 ERROR: Invalid heartbeat mount options [ 1103.155768][T19443] (syz-executor.2,19443,1):ocfs2_fill_super:1190 ERROR: status = -22 05:18:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1103.200581][T19459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 05:18:14 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1103.320670][T19465] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1103.338678][ T9783] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1103.450154][T19484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1103.493210][ T34] audit: type=1804 audit(1605158295.020:393): pid=19476 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2038/cgroup.controllers" dev="sda1" ino=16371 res=1 errno=0 [ 1103.588674][ T9783] usb 2-1: Using ep0 maxpacket: 8 [ 1103.709213][ T9783] usb 2-1: descriptor type invalid, skip [ 1103.714871][ T9783] usb 2-1: descriptor type invalid, skip [ 1103.818667][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1103.829621][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1103.846593][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1104.018664][ T9783] usb 2-1: New USB device found, idVendor=056a, idProduct=0097, bcdDevice= 0.40 [ 1104.028094][ T9783] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1104.038043][ T9783] usb 2-1: Product: syz [ 1104.043957][ T9783] usb 2-1: Manufacturer: syz [ 1104.048646][ T9783] usb 2-1: SerialNumber: syz [ 1104.368916][ T9783] usbhid 2-1:1.0: can't add hid device: -22 [ 1104.375014][ T9783] usbhid: probe of 2-1:1.0 failed with error -22 [ 1104.391483][ T9783] usb 2-1: USB disconnect, device number 9 [ 1105.058526][ T9783] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 1105.338512][ T9783] usb 2-1: Using ep0 maxpacket: 8 [ 1105.488846][ T9783] usb 2-1: descriptor type invalid, skip [ 1105.494550][ T9783] usb 2-1: descriptor type invalid, skip [ 1105.598883][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1105.609840][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1105.626597][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1105.818578][ T9783] usb 2-1: New USB device found, idVendor=056a, idProduct=0097, bcdDevice= 0.40 [ 1105.827680][ T9783] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1105.842721][ T9783] usb 2-1: Product: syz [ 1105.846871][ T9783] usb 2-1: Manufacturer: syz [ 1105.858227][ T9783] usb 2-1: SerialNumber: syz 05:18:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:17 executing program 2: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x1a, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100"/32, 0x20, 0x8000}, {&(0x7f0000010100)="004e535230330100"/32, 0x20, 0x8800}, {&(0x7f0000010200)="0054454130310100"/32, 0x20, 0x9000}, {&(0x7f0000010300)="0100030051000100a46af0014d0000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/128, 0x80, 0x9a00}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c17213a2c002a4c696e7578205544464653000000000000000000000004050000", 0xe0, 0x9ac0}, {&(0x7f0000010500)="000000000000000001000000000000000000000000000000000000000000000006000300290001006ab8ae014e00000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x80, 0x9be0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200000100000000000000000000000600000001000000002a4c696e75782055444646530000000000000000000000040500"/128, 0x80, 0x9cc0}, {&(0x7f0000010700)="0000000000000000000000000000000000020000530000000106010000000000", 0x20, 0x9da0}, {&(0x7f0000010800)="050003007b0001001d15f0014f0000000500000001000000002b4e53523033000000000000000000000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x9e00}, {&(0x7f0000010900)="000000000000000000000000000000000000000000000000040000005400000028000000002a4c696e7578205544464653000000000000000000000004050000", 0x40, 0x9ea0}, {&(0x7f0000010a00)="0700030086000100ac6f1000500000000600000001000000000600007c000000", 0x20, 0xa000}, {&(0x7f0000010b00)="04000300e30001003168f0015100000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x80, 0xa200}, {&(0x7f0000010c00)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405000000000000", 0xa0, 0xa2e0}, {&(0x7f0000010d00)="080003004f0001000000f0015200"/32, 0x20, 0xa400}, {&(0x7f0000010e00)="09000300e300010024e97600530000000010e4070913122c1755422b0100000000000000000000001700000000000000000000000000000000000000000000000000000000000000010000002e0000000900000028000000002a4c696e757820554446465300000000000000000000000405000000000000050000000200000001020102010200"/160, 0xa0, 0xa600}, {&(0x7f0000010f00)="08010300e5000100f7d9080000000000280000000500000000000080ff000000", 0x20, 0xa800}, {&(0x7f0000011000)="000103002000010052d7f001010000007810e4070913142c17213a2c0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600000000000000", 0x80, 0xaa00}, {&(0x7f0000011100)="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"/544, 0x220, 0xaae0}, {&(0x7f0000011400)="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", 0x360, 0xae00}, {&(0x7f0000011800)="0a0103002b000100d768d8000500000000000000040000000100000500000000000001000000000000000000a57c000001000000000000001a040000000000001a0400000000000003000000000000000010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a3901000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000110000000000000000000000100000001a04000006000000", 0xe0, 0xb200}, {&(0x7f0000011900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0xb400}, {&(0x7f0000011e00)="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"/288, 0x120, 0xba00}, {&(0x7f0000012000)="0a010300180001000528d2000a00000000000000040000000100000500000000000003000000000000000000a57c000001000000000000000a000000000000000a0000000000000000000000000000000010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a3901000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001300000000000000000000000a00000073797a6b616c6c65727300"/256, 0x100, 0xbc00}, {&(0x7f0000012100)="0a010300ac00010007b3d8000b00000000000000040000000100000500000000000001000000000000000000a57c000002000000000000002823000000000000282300000000000012000000000000000010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a3901000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e75782055444646530000000000000000000000040500000000000014000000000000000000000010000000282300000c000000", 0xe0, 0xbe00}, {&(0x7f0000012200)="0a01030045000100d01b2c011e00000000000000040000000100000500000000000003000000000000000000a57c000001000000000000006400000000000000640000000000000000000000000000000010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a390010e4070913122c17544a3901000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001600000000000000000000006400000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c65727300000000", 0x140, 0xe400}, {&(0x7f0000012400)="020003009d0001002700f0017f000000000c00004d000000000c00004d000000", 0x20, 0xfe00}], 0x0, &(0x7f0000012500)) 05:18:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:17 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:17 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:17 executing program 1: syz_usb_connect$hid(0x0, 0x3f, &(0x7f00000001c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x56a, 0x97, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9}, {{}, [{{0x9, 0x5, 0x2, 0x3, 0x0, 0x5}}]}}}]}}]}}, 0x0) [ 1105.988135][T19518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1106.001046][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 1106.011323][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.029266][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 05:18:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1106.050891][ T34] audit: type=1804 audit(1605158297.580:394): pid=19527 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2039/cgroup.controllers" dev="sda1" ino=16312 res=1 errno=0 [ 1106.077111][T19520] UDF-fs: Scanning with blocksize 512 failed [ 1106.098843][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 1106.109864][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.119814][ T9783] usbhid 2-1:1.0: can't add hid device: -22 [ 1106.128637][ T9783] usbhid: probe of 2-1:1.0 failed with error -22 [ 1106.140066][ T9783] usb 2-1: USB disconnect, device number 10 [ 1106.146744][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.157760][T19520] UDF-fs: Scanning with blocksize 1024 failed [ 1106.166918][T19536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1106.180066][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 05:18:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:17 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1106.194427][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.217500][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.230497][T19520] UDF-fs: Scanning with blocksize 2048 failed [ 1106.236818][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 1106.249066][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.262641][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.278927][T19520] UDF-fs: Scanning with blocksize 4096 failed [ 1106.284660][T19547] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1106.299632][T19520] UDF-fs: warning (device loop2): udf_fill_super: No partition found (1) [ 1106.374242][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 1106.394964][ T34] audit: type=1804 audit(1605158297.920:395): pid=19548 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2040/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 [ 1106.416650][T19557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1106.436556][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.455233][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.474315][T19520] UDF-fs: Scanning with blocksize 512 failed [ 1106.508414][ T9783] usb 2-1: new high-speed USB device number 11 using dummy_hcd 05:18:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1106.531165][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 1106.545499][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.579987][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.610484][T19520] UDF-fs: Scanning with blocksize 1024 failed [ 1106.626053][T19566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1106.635576][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 05:18:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="28000000100001040000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1106.710167][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.763442][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.778629][ T9783] usb 2-1: Using ep0 maxpacket: 8 [ 1106.781814][T19520] UDF-fs: Scanning with blocksize 2048 failed [ 1106.803931][T19576] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1106.828013][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=256, location=256 [ 1106.842307][T19576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1106.855858][T19520] UDF-fs: error (device loop2): udf_read_tagged: read failed, block=512, location=512 [ 1106.930752][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1106.937120][T19520] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 1106.944427][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1106.960062][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1106.996824][T19520] UDF-fs: Scanning with blocksize 4096 failed [ 1107.007337][T19520] UDF-fs: warning (device loop2): udf_fill_super: No partition found (1) [ 1107.148343][ T9783] usb 2-1: New USB device found, idVendor=056a, idProduct=0097, bcdDevice= 0.40 [ 1107.160743][ T9783] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1107.178982][ T9783] usb 2-1: Product: syz [ 1107.198084][ T9783] usb 2-1: Manufacturer: syz [ 1107.202787][ T9783] usb 2-1: SerialNumber: syz [ 1107.498614][ T9783] usbhid 2-1:1.0: can't add hid device: -22 [ 1107.504620][ T9783] usbhid: probe of 2-1:1.0 failed with error -22 [ 1107.513153][ T9783] usb 2-1: USB disconnect, device number 11 [ 1108.248362][ T9783] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 1108.498197][ T9783] usb 2-1: Using ep0 maxpacket: 8 [ 1108.618552][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1108.629664][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1108.647486][ T9783] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1108.818508][ T9783] usb 2-1: New USB device found, idVendor=056a, idProduct=0097, bcdDevice= 0.40 [ 1108.827563][ T9783] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1108.839201][ T9783] usb 2-1: Product: syz [ 1108.844258][ T9783] usb 2-1: Manufacturer: syz [ 1108.848930][ T9783] usb 2-1: SerialNumber: syz 05:18:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="28000000100001040000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:20 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) lstat(0x0, 0x0) [ 1109.018725][T19603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1109.050014][T19610] attempt to access beyond end of device [ 1109.050014][T19610] loop2: rw=4096, want=107, limit=1 05:18:20 executing program 1: [ 1109.057992][T19603] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1109.068817][T19610] XFS (loop2): SB validate failed with error -5. 05:18:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="28000000100001040000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:20 executing program 1: [ 1109.124074][ T34] audit: type=1804 audit(1605158300.650:396): pid=19608 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2041/cgroup.controllers" dev="sda1" ino=16017 res=1 errno=0 [ 1109.151466][ T9783] usbhid 2-1:1.0: can't add hid device: -22 [ 1109.167611][ T9783] usbhid: probe of 2-1:1.0 failed with error -22 [ 1109.184407][ T9783] usb 2-1: USB disconnect, device number 12 05:18:20 executing program 1: [ 1109.268918][T19610] attempt to access beyond end of device [ 1109.268918][T19610] loop2: rw=4096, want=107, limit=1 [ 1109.272122][T19638] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1109.279777][T19610] XFS (loop2): SB validate failed with error -5. 05:18:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) lstat(0x0, 0x0) 05:18:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400000000000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:20 executing program 1: [ 1109.485121][T19656] attempt to access beyond end of device [ 1109.485121][T19656] loop2: rw=4096, want=107, limit=1 [ 1109.496325][T19656] XFS (loop2): SB validate failed with error -5. 05:18:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:23 executing program 1: 05:18:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400000000000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:23 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) lstat(0x0, 0x0) 05:18:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, 0x0, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:23 executing program 1: [ 1112.057829][T19678] __nla_validate_parse: 2 callbacks suppressed [ 1112.057837][T19678] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400000000000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:23 executing program 1: [ 1112.102767][T19676] attempt to access beyond end of device [ 1112.102767][T19676] loop2: rw=4096, want=107, limit=1 [ 1112.126169][T19676] XFS (loop2): SB validate failed with error -5. 05:18:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) lstat(0x0, 0x0) [ 1112.134750][ T34] audit: type=1804 audit(1605158303.661:397): pid=19692 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2042/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 [ 1112.182524][T19696] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:23 executing program 1: 05:18:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/18, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1112.332208][T19705] attempt to access beyond end of device [ 1112.332208][T19705] loop2: rw=4096, want=107, limit=1 [ 1112.335226][T19715] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1112.352992][T19705] XFS (loop2): SB validate failed with error -5. [ 1112.374124][T19715] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:26 executing program 1: 05:18:26 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/18, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, 0x0, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:26 executing program 1: [ 1115.103238][T19734] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1115.126943][T19732] attempt to access beyond end of device [ 1115.126943][T19732] loop2: rw=4096, want=107, limit=1 [ 1115.139827][T19732] XFS (loop2): SB validate failed with error -5. 05:18:26 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:26 executing program 1: [ 1115.160598][ T34] audit: type=1804 audit(1605158306.691:398): pid=19746 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2043/cgroup.controllers" dev="sda1" ino=16311 res=1 errno=0 [ 1115.165690][T19747] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/18, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:26 executing program 1: 05:18:26 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1115.346095][T19761] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1115.373166][T19761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/19, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:29 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 05:18:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:29 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, 0x0, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:29 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000500), 0x8, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) dup3(r0, r1, 0x0) [ 1118.154912][T19783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1118.214488][T19789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/19, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:29 executing program 1: getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000500), 0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000240), 0x0) 05:18:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1118.325258][T19805] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1118.375825][T19805] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1118.491828][ T34] audit: type=1804 audit(1605158310.021:399): pid=19817 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2045/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:18:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:32 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/105) 05:18:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/19, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:32 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:32 executing program 1: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x3) [ 1121.255977][T19838] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1121.286217][T19838] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:32 executing program 1: timer_create(0x0, &(0x7f0000000180)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, 0x0) 05:18:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[]) [ 1121.325987][ T34] audit: type=1804 audit(1605158312.851:400): pid=19835 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2046/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 05:18:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:32 executing program 1: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 05:18:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[]) 05:18:33 executing program 1: syz_emit_ethernet(0x2b, &(0x7f0000000000)={@dev, @link_local, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @multicast, "", @empty, "ec36711c436f5d9e24"}}}}, 0x0) [ 1121.448714][T19857] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1121.502262][T19863] bridge14: port 1(syz_tun) entered disabled state [ 1121.533235][T19863] bridge105: port 1(syz_tun) entered blocking state [ 1121.545674][T19863] bridge105: port 1(syz_tun) entered disabled state 05:18:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[]) 05:18:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007e80)=[{{&(0x7f0000000840)=@sco={0x1f, @none}, 0x80, 0x0}}], 0x1, 0x0) 05:18:35 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:35 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:35 executing program 1: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) 05:18:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1124.316164][T19884] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1124.365646][ T34] audit: type=1804 audit(1605158315.892:401): pid=19881 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2047/cgroup.controllers" dev="sda1" ino=16315 res=1 errno=0 [ 1124.402180][T19893] bridge105: port 1(syz_tun) entered disabled state 05:18:36 executing program 1: pselect6(0x40, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000380), 0x0) 05:18:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1124.424145][T19893] bridge106: port 1(syz_tun) entered blocking state [ 1124.436224][T19893] bridge106: port 1(syz_tun) entered disabled state [ 1124.453629][T19897] XFS (loop2): Invalid superblock magic number 05:18:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmsg(r0, 0x0, 0x0) 05:18:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1124.548558][T19910] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1124.583370][T19910] bridge106: port 1(syz_tun) entered disabled state [ 1124.594119][T19910] bridge107: port 1(syz_tun) entered blocking state [ 1124.606893][T19910] bridge107: port 1(syz_tun) entered disabled state [ 1124.669149][T19915] XFS (loop2): Invalid superblock magic number 05:18:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:18:38 executing program 1: 05:18:38 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:38 executing program 1: 05:18:38 executing program 1: 05:18:38 executing program 1: [ 1127.363711][T19942] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1127.387299][T19937] XFS (loop2): Invalid superblock magic number 05:18:38 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {0x0}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1127.417799][T19952] bridge107: port 1(syz_tun) entered disabled state [ 1127.440163][ T34] audit: type=1804 audit(1605158318.972:402): pid=19943 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2048/cgroup.controllers" dev="sda1" ino=16315 res=1 errno=0 05:18:39 executing program 1: 05:18:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1127.466929][T19952] bridge108: port 1(syz_tun) entered blocking state [ 1127.473700][T19952] bridge108: port 1(syz_tun) entered disabled state [ 1127.557413][T19969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1127.581874][T19964] XFS (loop2): Invalid superblock magic number [ 1127.594632][T19969] bridge108: port 1(syz_tun) entered disabled state [ 1127.621875][T19969] bridge109: port 1(syz_tun) entered blocking state [ 1127.637843][T19969] bridge109: port 1(syz_tun) entered disabled state 05:18:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:18:41 executing program 1: 05:18:41 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:41 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {0x0}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:41 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff390002", 0x10) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:41 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82040, 0x18) [ 1130.419606][T19992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1130.450389][T19992] bridge109: port 1(syz_tun) entered disabled state [ 1130.457468][T19988] XFS (loop2): Invalid superblock magic number [ 1130.464515][ T34] audit: type=1804 audit(1605158321.992:403): pid=19990 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2049/cgroup.controllers" dev="sda1" ino=16387 res=1 errno=0 [ 1130.507224][T19992] bridge110: port 1(syz_tun) entered blocking state 05:18:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x4000000) 05:18:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:42 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {0x0}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1130.519266][T19992] bridge110: port 1(syz_tun) entered disabled state 05:18:42 executing program 1: symlinkat(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000440)='./file0\x00', 0x0) 05:18:42 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1130.631009][T20018] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1130.669521][T20018] bridge110: port 1(syz_tun) entered disabled state 05:18:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x10) [ 1130.699033][T20018] bridge111: port 1(syz_tun) entered blocking state [ 1130.705847][T20019] XFS (loop2): Invalid superblock magic number [ 1130.723604][T20018] bridge111: port 1(syz_tun) entered disabled state [ 1130.807511][ T34] audit: type=1804 audit(1605158322.342:404): pid=20032 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2050/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:18:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xc800) 05:18:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:18:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:44 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:44 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff390002", 0x10) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000080), 0x0, 0x40080c4, 0x0, 0x0) [ 1133.443849][T20051] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1133.474180][T20050] XFS (loop2): Invalid superblock magic number 05:18:45 executing program 1: open$dir(&(0x7f00000002c0)='./file0\x00', 0x3240, 0x0) [ 1133.499779][T20067] bridge111: port 1(syz_tun) entered disabled state [ 1133.500954][ T34] audit: type=1804 audit(1605158325.033:405): pid=20049 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2051/cgroup.controllers" dev="sda1" ino=16324 res=1 errno=0 05:18:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:45 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x42040, 0x2) [ 1133.548671][T20067] bridge112: port 1(syz_tun) entered blocking state [ 1133.555285][T20067] bridge112: port 1(syz_tun) entered disabled state 05:18:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8000) [ 1133.655242][T20076] XFS (loop2): Invalid superblock magic number [ 1133.698956][T20086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1133.713677][T20086] bridge112: port 1(syz_tun) entered disabled state 05:18:45 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1133.740450][T20086] bridge113: port 1(syz_tun) entered blocking state [ 1133.753839][T20086] bridge113: port 1(syz_tun) entered disabled state [ 1133.826622][T20096] XFS (loop2): Invalid superblock magic number 05:18:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 05:18:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, 0x0, 0x0, 0x0) 05:18:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:47 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:47 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346", 0x34}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:47 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff390002", 0x10) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x20000040) [ 1136.458818][T20110] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40001) [ 1136.520313][T20118] bridge113: port 1(syz_tun) entered disabled state [ 1136.552746][T20118] bridge114: port 1(syz_tun) entered blocking state [ 1136.568717][T20118] bridge114: port 1(syz_tun) entered disabled state 05:18:48 executing program 1: 05:18:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1136.601609][ T34] audit: type=1804 audit(1605158328.133:406): pid=20133 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2052/cgroup.controllers" dev="sda1" ino=16314 res=1 errno=0 [ 1136.612081][T20116] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:48 executing program 1: [ 1136.702854][T20141] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1136.721169][T20141] bridge114: port 1(syz_tun) entered disabled state 05:18:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346", 0x34}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1136.770087][T20141] bridge115: port 1(syz_tun) entered blocking state [ 1136.790911][T20141] bridge115: port 1(syz_tun) entered disabled state [ 1136.809169][T20148] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 05:18:51 executing program 1: 05:18:51 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346", 0x34}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:51 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f00", 0x18) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:51 executing program 1: [ 1139.538133][T20167] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1139.574171][T20167] bridge115: port 1(syz_tun) entered disabled state [ 1139.584845][T20167] bridge116: port 1(syz_tun) entered blocking state [ 1139.607859][T20170] XFS (loop2): device supports 512 byte sectors (not 0) [ 1139.614412][T20167] bridge116: port 1(syz_tun) entered disabled state 05:18:51 executing program 1: 05:18:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc6491467", 0x4e}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1139.628262][ T34] audit: type=1804 audit(1605158331.163:407): pid=20183 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2053/cgroup.controllers" dev="sda1" ino=16019 res=1 errno=0 05:18:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1139.680831][T20185] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:18:51 executing program 1: 05:18:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc6491467", 0x4e}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1139.775225][T20191] XFS (loop2): device supports 512 byte sectors (not 0) [ 1139.798192][T20201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1139.837921][T20201] bridge116: port 1(syz_tun) entered disabled state [ 1139.858294][T20201] bridge117: port 1(syz_tun) entered blocking state [ 1139.865210][T20201] bridge117: port 1(syz_tun) entered disabled state [ 1139.925468][T20207] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 05:18:54 executing program 1: 05:18:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:54 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc6491467", 0x4e}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:54 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f00", 0x18) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:54 executing program 1: [ 1142.605038][T20233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1142.620990][T20227] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813", 0x5b}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1142.663355][T20237] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1142.675238][ T34] audit: type=1804 audit(1605158334.214:408): pid=20246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2054/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 [ 1142.700989][T20239] bridge117: port 1(syz_tun) entered disabled state 05:18:54 executing program 1: [ 1142.724819][T20239] bridge118: port 1(syz_tun) entered blocking state [ 1142.731653][T20239] bridge118: port 1(syz_tun) entered disabled state 05:18:54 executing program 1: 05:18:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:54 executing program 1: [ 1142.828454][T20258] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1142.838145][T20250] XFS (loop2): device supports 512 byte sectors (not 0) [ 1142.841507][T20258] bridge118: port 1(syz_tun) entered disabled state [ 1142.863615][T20258] bridge119: port 1(syz_tun) entered blocking state [ 1142.886859][T20258] bridge119: port 1(syz_tun) entered disabled state 05:18:57 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f00", 0x18) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:57 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813", 0x5b}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:57 executing program 1: 05:18:57 executing program 5: waitid(0x3f53b6d9a3e62382, 0xffffffffffffffff, 0x0, 0x2, 0x0) [ 1145.650238][T20278] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1145.672084][T20278] bridge119: port 1(syz_tun) entered disabled state [ 1145.680675][T20278] bridge120: port 1(syz_tun) entered blocking state 05:18:57 executing program 1: r0 = openat$urandom(0xffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x402c5828, &(0x7f00000000c0)=0xfffffff7) 05:18:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1145.698918][T20278] bridge120: port 1(syz_tun) entered disabled state 05:18:57 executing program 1: syz_io_uring_setup(0x69ca, &(0x7f0000000240)={0x0, 0xfffffffd, 0x8}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0) [ 1145.735935][T20290] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1145.756237][T20277] XFS (loop2): device supports 512 byte sectors (not 0) [ 1145.767758][T20296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:57 executing program 5: symlinkat(&(0x7f00000000c0)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:18:57 executing program 1: r0 = syz_io_uring_setup(0x69ca, &(0x7f0000000240), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000100), &(0x7f00000002c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) syz_io_uring_setup(0xe31, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)) [ 1145.780784][ T34] audit: type=1804 audit(1605158337.314:409): pid=20295 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2055/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 [ 1145.798574][T20296] bridge120: port 1(syz_tun) entered disabled state [ 1145.822281][T20296] bridge121: port 1(syz_tun) entered blocking state 05:18:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813", 0x5b}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1145.862402][T20296] bridge121: port 1(syz_tun) entered disabled state [ 1145.965624][T20316] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @empty}}) 05:18:57 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c", 0x1c) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:57 executing program 1: 05:18:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02", 0x61}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:57 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:58 executing program 5: 05:18:58 executing program 1: [ 1146.504093][T20343] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1146.530756][T20338] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:58 executing program 1: [ 1146.577215][T20352] bridge121: port 1(syz_tun) entered disabled state [ 1146.591009][T20352] bridge122: port 1(syz_tun) entered blocking state 05:18:58 executing program 5: 05:18:58 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02", 0x61}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1146.617875][T20352] bridge122: port 1(syz_tun) entered disabled state [ 1146.646342][T20357] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:18:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:58 executing program 1: [ 1146.756514][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1146.779915][T20369] bridge122: port 1(syz_tun) entered disabled state [ 1146.799364][T20368] XFS (loop2): device supports 512 byte sectors (not 0) [ 1146.815829][T20369] bridge123: port 1(syz_tun) entered blocking state [ 1146.835940][T20369] bridge123: port 1(syz_tun) entered disabled state [ 1146.843886][ T34] audit: type=1804 audit(1605158338.374:410): pid=20383 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2057/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:18:58 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c", 0x1c) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:58 executing program 5: 05:18:58 executing program 1: 05:18:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:18:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02", 0x61}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:58 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:18:58 executing program 1: 05:18:58 executing program 5: [ 1147.375226][T20397] XFS (loop2): device supports 512 byte sectors (not 0) [ 1147.377590][T20398] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1147.411130][T20398] bridge123: port 1(syz_tun) entered disabled state [ 1147.419564][T20398] bridge124: port 1(syz_tun) entered blocking state [ 1147.430521][T20398] bridge124: port 1(syz_tun) entered disabled state 05:18:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c", 0x64}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:59 executing program 5: 05:18:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1147.456428][ T34] audit: type=1804 audit(1605158338.984:411): pid=20396 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2058/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 05:18:59 executing program 5: [ 1147.588211][T20420] bridge124: port 1(syz_tun) entered disabled state [ 1147.596750][T20420] bridge125: port 1(syz_tun) entered blocking state [ 1147.603503][T20420] bridge125: port 1(syz_tun) entered disabled state [ 1147.641307][T20418] XFS (loop2): device supports 512 byte sectors (not 0) 05:18:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 05:18:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsu\x00', 0x4800, 0x0) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0xfffffffffffffe06) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x10, 0x3, 0x0) sendfile(r5, r0, 0x0, 0xddf5) 05:18:59 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') syz_read_part_table(0x7, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='9p\x00', 0x0, 0x0) 05:18:59 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c", 0x1c) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:18:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c", 0x64}], 0x0, &(0x7f0000001580)=ANY=[]) 05:18:59 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1148.222779][T20450] __nla_validate_parse: 2 callbacks suppressed [ 1148.222787][T20450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:18:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000140)=@req={0x28, &(0x7f0000000100)={'veth0_to_hsr\x00', @ifru_flags}}) [ 1148.266214][T20450] bridge125: port 1(syz_tun) entered disabled state [ 1148.279498][T20450] bridge126: port 1(syz_tun) entered blocking state [ 1148.294536][T20450] bridge126: port 1(syz_tun) entered disabled state 05:18:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 1148.302340][ T34] audit: type=1804 audit(1605158339.824:412): pid=20444 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2059/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 [ 1148.334078][T20457] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:18:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="79a060ceebd01a9f19306d10bc725e39", 0x10) 05:18:59 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 1148.385183][T20446] XFS (loop2): device supports 512 byte sectors (not 0) [ 1148.419379][T20471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 05:19:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 1148.456921][T20471] bridge126: port 1(syz_tun) entered disabled state [ 1148.465443][T20471] bridge127: port 1(syz_tun) entered blocking state [ 1148.472331][T20471] bridge127: port 1(syz_tun) entered disabled state 05:19:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c", 0x64}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:00 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='h\x00\x00\x000\x00Q'], 0x68}}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, 0x0, &(0x7f0000000000)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x86ffde, 0x0) 05:19:00 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000040)=""/235) [ 1148.598217][T20484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1148.621237][T20484] bridge127: port 1(syz_tun) entered disabled state [ 1148.638395][T20484] bridge128: port 1(syz_tun) entered blocking state 05:19:00 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0x3c1, 0x3, 0x3f8, 0x130, 0x268, 0x0, 0x0, 0x268, 0x328, 0x460, 0x460, 0x328, 0x460, 0x3, 0x0, {[{{@uncond, 0x0, 0xe8, 0x130, 0x0, {}, [@common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@private0, @mcast2, [], [], 'virt_wifi0\x00', 'bond0\x00'}, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ptchown_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x458) [ 1148.659511][T20484] bridge128: port 1(syz_tun) entered disabled state [ 1148.696058][T20485] XFS (loop2): device supports 512 byte sectors (not 0) [ 1148.781574][T20504] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' 05:19:00 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c0800", 0x1e) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70", 0x66}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:19:00 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000fff9) 05:19:00 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000000)=""/109) 05:19:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000000c0)="66b9800000c00f326635000800000f30b800008ee866b9800000c00f326635000400000f300f01d12e0f78b200000f320f073626640f38042fd05b80b800008ed0", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1149.086059][T20525] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1149.099759][T20525] bridge128: port 1(syz_tun) entered disabled state [ 1149.147837][T20525] bridge129: port 1(syz_tun) entered blocking state [ 1149.156583][T20525] bridge129: port 1(syz_tun) entered disabled state [ 1149.170532][ T34] audit: type=1804 audit(1605158340.694:413): pid=20522 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2060/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 05:19:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1149.196875][T20520] XFS (loop2): device supports 512 byte sectors (not 0) 05:19:00 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000fff9) 05:19:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70", 0x66}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1149.303091][T20545] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1149.330353][T20545] bridge129: port 1(syz_tun) entered disabled state [ 1149.362353][T20545] bridge130: port 1(syz_tun) entered blocking state [ 1149.374041][T20549] XFS (loop2): device supports 512 byte sectors (not 0) [ 1149.378672][T20545] bridge130: port 1(syz_tun) entered disabled state [ 1149.432002][ T34] audit: type=1804 audit(1605158340.954:414): pid=20551 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2061/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 05:19:01 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, 0x0) 05:19:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70", 0x66}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @broadcast}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1149.579417][T20571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1149.593328][T20571] bridge130: port 1(syz_tun) entered disabled state [ 1149.613874][T20571] bridge131: port 1(syz_tun) entered blocking state [ 1149.620552][T20571] bridge131: port 1(syz_tun) entered disabled state [ 1149.629295][T20568] XFS (loop2): device supports 512 byte sectors (not 0) 05:19:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c0800", 0x1e) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:01 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000fff9) 05:19:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x97, &(0x7f0000000240)=""/151, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:19:01 executing program 4: 05:19:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000000c0)="66b9800000c00f326635000800000f30b800008ee866b9800000c00f326635000400000f300f01d12e0f78b200000f320f073626640f38042fd05b80b800008ed0", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:19:01 executing program 4: 05:19:01 executing program 5: 05:19:01 executing program 4: [ 1150.036143][ T34] audit: type=1804 audit(1605158341.564:415): pid=20599 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2062/cgroup.controllers" dev="sda1" ino=16378 res=1 errno=0 [ 1150.062912][T20601] XFS (loop2): Invalid superblock magic number 05:19:01 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:01 executing program 5: [ 1150.237188][T20623] XFS (loop2): Invalid superblock magic number [ 1150.267928][ T34] audit: type=1804 audit(1605158341.794:416): pid=20630 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2063/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:19:02 executing program 5: 05:19:02 executing program 4: 05:19:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:02 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c0800", 0x1e) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:02 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000000c0)="66b9800000c00f326635000800000f30b800008ee866b9800000c00f326635000400000f300f01d12e0f78b200000f320f073626640f38042fd05b80b800008ed0", 0x41}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:19:02 executing program 5: 05:19:02 executing program 4: 05:19:02 executing program 5: [ 1150.877161][T20646] XFS (loop2): Invalid superblock magic number [ 1150.901408][ T34] audit: type=1804 audit(1605158342.424:417): pid=20644 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2064/cgroup.controllers" dev="sda1" ino=16309 res=1 errno=0 05:19:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:02 executing program 4: 05:19:02 executing program 5: 05:19:02 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000180)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff}}}}}}}]}}, &(0x7f0000000340)={0x0, 0x0, 0xc, &(0x7f0000000240)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7}]}, 0x2, [{0x2, &(0x7f0000000280)=@string={0x2}}, {0x48, &(0x7f00000002c0)=@string={0x48, 0x3, "745f9e265ea5927e496992053ccbb663b6e952bb2c37f3deb8ea1b044150121a4ae8abf31687b92cb8228b9f0438b0f8a85c5a8392e25b8f4c0b802201c38af676ef31da630f"}}]}) 05:19:02 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:02 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x6, 0xe0, &(0x7f0000000000)="1e58a41df0d74fc292c272524695992c2b70b112232b3a9736a6844574aa8d8d0b0944af695fc69b7bffbdee71fa8e3342297acb66e63f280ae0e7c5506d6ee6acf093f6ec95246b382c39d826e71b691adbb7e2b1df0c0b2ce6b92976eb6ee8269ae3ed230590417dcff0fa0d9e5e7a581e466b36a85e117f7fd94744ddeddb2dbeb0af32abd14975e03bcc32f85b4720b6f2facbd856fdbb2d379ff2815f656c953982ebbb164e699b714734094fecac1339505ac466319a5ea424e60576f8fa485f58206fbd09f95ba8a85b9ddd761dcc82eef8031816ad6f679199497fc1") ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000000100)={0x1, 0xffffffff, 0x0, 0x4, 0x9, 0x7}) syz_usb_disconnect(0xffffffffffffffff) read$hidraw(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000001140)={0x3, 0x200, 0xff, 0x2, 0x7, 0x10001}) ioctl$HIDIOCSREPORT(0xffffffffffffffff, 0x400c4808, &(0x7f0000001180)={0x3, 0x2, 0x100}) r0 = syz_open_dev$hiddev(&(0x7f00000011c0)='/dev/usb/hiddev#\x00', 0x9, 0x2000) ioctl$HIDIOCGVERSION(r0, 0x80044801, &(0x7f0000001200)) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f0000001240)={0x2, 0x100, 0x7, 0x1ff, 0x200, 0x8001}) read$hiddev(r0, &(0x7f0000001280)=""/40, 0x28) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f00000012c0)=""/156) r1 = syz_usb_connect$cdc_ecm(0x0, 0x6e, &(0x7f0000001380)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x1, 0x1, 0x6, 0xc0, 0x6, [{{0x9, 0x4, 0x0, 0x7, 0x3, 0x2, 0x6, 0x0, 0x1, {{0x9, 0x24, 0x6, 0x0, 0x0, "802c2a57"}, {0x5, 0x24, 0x0, 0xe7e}, {0xd, 0x24, 0xf, 0x1, 0x6, 0x81, 0x1, 0x3}, [@network_terminal={0x7, 0x24, 0xa, 0xff, 0x1, 0x3f, 0xf6}, @mbim_extended={0x8, 0x24, 0x1c, 0x4, 0x9, 0xfff8}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0xce}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x400, 0x4, 0x9, 0x34}}], {{0x9, 0x5, 0x82, 0x2, 0x20, 0x20, 0x3e, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x2, 0xe7, 0x40}}}}}]}}]}}, &(0x7f0000001a80)={0xa, &(0x7f0000001400)={0xa, 0x6, 0x250, 0x81, 0x2, 0x7, 0x40, 0x81}, 0x22a, &(0x7f0000001440)={0x5, 0xf, 0x22a, 0x6, [@generic={0x9a, 0x10, 0x1, "1e2e4c7551176e682c47fa33dd8f94b585d767f54932b42416df29ac250042f277c384c7e1464a4f5dd289044f1cec4dad11a80ebcdec2e8fc7d8246fc1954d44faa977b94f3564ed6b2dc177380847f6bc2a69ac8045fd716542ee3b6a9ceb3bdd1e329455e6c4aa644c19bace1c21a6186da14d3a7a030375547c1c3a376ae28108166d6a68ed9d82524c0effd1d9cc1c9cba69b6420"}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "43c7b19302814ac9b76fd721db311262"}, @wireless={0xb, 0x10, 0x1, 0x8, 0x1, 0xfa, 0x6, 0x5, 0x80}, @generic={0x78, 0x10, 0x4, "243e52196d234ecbcc41beb75fc939dfc38075831ae6f0a57320df8709fb9566b716639c0c8d95ca3b4489a88f9389655575193e8b4ac286ab5a346c482c67729f30c2e817dee96c5643736e042d04413307ba3fdc0884c5a840f32218a45f94b1385ac2bdb21c8e80b59a3a7af3f6efc65a6b157d"}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "eb8f384d66bdcfb488508c5976a5d661"}, @generic={0xe0, 0x10, 0xa, "8a477862722795ffc3fa6c72878c9f1bb19c5418e5ccdc1407652f543ad94cdd48386603ed920b1e0f1bdc2bf671614e946f07b2d2a1806c6dbe69e8fc97c62395709b9466371b5e7be4bdc8d7792b94666e693188e4041d7de24b81381469892562e205d88038f1ad90d1f015bf6131b2f6a092a6520cd96f7bcd64d01581bfa228c82b772168d1f9ff1c9077ac6f3ad705f6a554436e72fe5857686b1bab93ae0868accd323a4d49087c00015909fc06321c7ed6df6da771a88147740a257863fcc1a4d94f2cf6466b0c42fcfff9f3de25cd15cb70b524481a6d2497"}]}, 0x7, [{0xc2, &(0x7f0000001680)=@string={0xc2, 0x3, "6ed888a453c733acdcf9d0f7676b3e47e6c316ddfa73558bf046d68c2acaed413e937371b7ec66aaeb031e8e8317e81a0166c243824c710b1580436a6103ae19d65ee1e530e85610c6cfcfcca22c1fea421b6112909e7ade83c6be75c026abc43696894b4f202a8f4c1241f6336e3bb45d301319dd78dd6b98ddab21cbc59dc4b1f34c887bcba5f2cce80fbaf862fe8806c5c87e568d6e599c96b12382807a0ee0a4b823691c362d6166525f4b761100e906a934caccc4b15d826c74d2db098b"}}, {0x4, &(0x7f0000001780)=@lang_id={0x4, 0x3, 0x403}}, {0xfb, &(0x7f00000017c0)=@string={0xfb, 0x3, "a97dc3fff7671f7561d0e74a43f3036c4cd170f792f8a31431861495f64d13b6c8ddd72c35a1685ac4b0112c5cb1b51cdf80fdd9ba33cce2d35130d5af3860dcc1e6a5379683c34ea2e3de12f63287540463b097a5b985f4d8c512523ef846894afb2ff7f282719b2db093f4ea6f944311b19bbc48aeb39e1d053fff8e999535dea5dbf7a4099db94dfaae78da8ea6c8d1dea217af228f811ee24427ca6bdc3c644c223b9312a60b823a358666cc954b09807ae69d2784c512ddd7e54ff2247cc6d3681ab6a97dcf618fe1fafa2da534ec0330c9027598d1e78d716a99500df700b8f2882de18125259128851f29f82c76f4bc12a667212207"}}, {0x24, &(0x7f00000018c0)=@string={0x24, 0x3, "d7ae01da41443b14d7ef6a4c459a292636d178cfe0a504d0e757660e60b83a59b265"}}, {0x4, &(0x7f0000001900)=@lang_id={0x4, 0x3, 0x3c0a}}, {0xd4, &(0x7f0000001940)=@string={0xd4, 0x3, "e2f9c76395756b059f58adc3d12bbeaf2dbdd35e2556b785f37e0f763b54d1a9883d1a540c7070ef0de363b5fe9bebeb5b12f78c91500b96cc157b98f29b4a6e9499b3026c02adf7f19ccbd29e92741ca036e66f8d36f0d769d1131e68c2651fad2326d1d34b81b2f9657d91420c142e5a55d45f9d303c1ce9fd72386c7c9238d018104169672e396479278517c36ea0e07269eb23cf216894e803eac7485f4ee2facf368fddca8181f0148b63004ae5f1c1c9fc72d618221b0b1dd6ab62860750ed5f0f83b82664b7bec36acc7445bbb7d2"}}, {0x17, &(0x7f0000001a40)=@string={0x17, 0x3, "30716fd67a3aff808d1b226a34f87ac77805f52e60"}}]}) syz_usb_control_io(r1, &(0x7f0000001cc0)={0x2c, &(0x7f0000001b00)={0x40, 0x31, 0x90, {0x90, 0x21, "f47dba54d10bd6e71f79d6f12df26e190bd72f436019c3e1ec7d06895f56f89cf783618b4040d2f731c111e6695c469ea37997aaa50afd8a336fe77503d816ce82352f4e1564d963c10229c5b990c979b0e065e1ad69cb49d9da2d930525974fa3a17952ec034f0e34c9919c9ef5f1b9f23bcfe6840393b9f0b9487c29cb3425ea26248ddd286401e1d4c2a38267"}}, &(0x7f0000001bc0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x415}}, &(0x7f0000001c00)={0x0, 0xf, 0xf, {0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0xc, 0x3f, 0x1f, 0x7}]}}, &(0x7f0000001c40)={0x20, 0x29, 0xf, {0xf, 0x29, 0x7, 0x8, 0x7f, 0x9, 'g}uo', "98f39c8d"}}, &(0x7f0000001c80)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x1, 0x2, 0x3, 0x1f, 0x2, 0x16, 0xb7c}}}, &(0x7f0000002180)={0x84, &(0x7f0000001d00)={0x40, 0x3, 0x8a, "f6593c8c8fb89dfe236daa815da84c8110ea62ee41ac3876fc25bd58c792e43da3bde17683cd6ad873b75c5b3f252e3a7089007a03d82bd28b6210687f697c92d92c4543df374f7933da56d65055ffd05e4db0115906942748a113d94ac3637b79ea3a907303a9fe9cac3227671f1046381c196e796f97aeea3d3b75025ba0237d2acbcb9c395b88c3f6"}, &(0x7f0000001dc0)={0x0, 0xa, 0x1, 0x20}, &(0x7f0000001e00)={0x0, 0x8, 0x1, 0x7f}, &(0x7f0000001e40)={0x20, 0x0, 0x4, {0x3, 0x1}}, &(0x7f0000001e80)={0x20, 0x0, 0x4, {0x100, 0x5193988cea1fc3d0}}, &(0x7f0000001ec0)={0x40, 0x7, 0x2, 0xfffe}, &(0x7f0000001f00)={0x40, 0x9, 0x1, 0x98}, &(0x7f0000001f40)={0x40, 0xb, 0x2, "3303"}, &(0x7f0000001f80)={0x40, 0xf, 0x2, 0x4}, &(0x7f0000001fc0)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000002000)={0x40, 0x17, 0x6}, &(0x7f0000002040)={0x40, 0x19, 0x2, "4c96"}, &(0x7f0000002080)={0x40, 0x1a, 0x2, 0x4}, &(0x7f00000020c0)={0x40, 0x1c, 0x1, 0x4}, &(0x7f0000002100)={0x40, 0x1e, 0x1, 0x81}, &(0x7f0000002140)={0x40, 0x21, 0x1, 0x4}}) r2 = syz_open_dev$evdev(&(0x7f0000002240)='/dev/input/event#\x00', 0x1, 0x6a0122f0bf94c5a5) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000002280)=""/75) r3 = syz_open_dev$hiddev(&(0x7f0000002300)='/dev/usb/hiddev#\x00', 0xaa0e, 0x200100) ioctl$HIDIOCAPPLICATION(r3, 0x4802, 0xfffffffffffffff8) ioctl$HIDIOCINITREPORT(r3, 0x4805, 0x0) ioctl$HIDIOCGSTRING(0xffffffffffffffff, 0x81044804, &(0x7f00000023c0)={0x3b, "06052b9497157614891bc81c50d9f8c95e4a85750fa218b63e714cba52bd57a7bc1b0606e11c414f302f526f50f5c413b196f5be4306a4df2f07b0"}) [ 1151.130312][T20668] XFS (loop2): Invalid superblock magic number 05:19:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) [ 1151.225301][ T34] audit: type=1804 audit(1605158342.754:418): pid=20678 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2065/cgroup.controllers" dev="sda1" ino=16366 res=1 errno=0 [ 1151.274496][T20687] XFS (loop2): Invalid superblock magic number [ 1151.453988][ T43] usb 5-1: new high-speed USB device number 14 using dummy_hcd 05:19:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, &(0x7f0000001580)=ANY=[]) 05:19:03 executing program 1: 05:19:03 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000fff9) 05:19:03 executing program 1: 05:19:03 executing program 1: 05:19:03 executing program 1: 05:19:03 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000fff9) [ 1151.719312][ T43] usb 5-1: Using ep0 maxpacket: 8 [ 1151.737863][ T9783] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 1151.750336][T20708] XFS (loop2): Invalid superblock magic number [ 1151.943878][ T43] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1151.956296][ T43] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1151.966179][ T43] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1023 [ 1151.979473][ T43] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1151.989155][ T43] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1152.003896][ T9783] usb 6-1: Using ep0 maxpacket: 8 [ 1152.034511][ T43] usb 5-1: language id specifier not provided by device, defaulting to English [ 1152.154103][ T43] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1152.163182][ T43] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1152.175430][ T43] usb 5-1: Product: syz [ 1152.181056][ T43] usb 5-1: Manufacturer: 彴⚞ꕞ纒楉֒쬼掶뭒㜬Л偁ᨒ蜖ⲹ⊸龋㠄岨荚轛ୌ⊀쌁ལ [ 1152.195376][ T43] usb 5-1: SerialNumber: syz [ 1152.254288][ T9783] usb 6-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 32 [ 1152.264165][ T9783] usb 6-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 32 [ 1152.282106][ T9783] usb 6-1: config 1 interface 0 has no altsetting 0 [ 1152.473883][ T43] cdc_ncm 5-1:1.0: bind() failure [ 1152.474331][ T9783] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1152.481423][ T43] cdc_ncm 5-1:1.1: bind() failure [ 1152.507593][ T9783] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1152.509156][ T43] usb 5-1: USB disconnect, device number 14 [ 1152.525734][ T9783] usb 6-1: Product: 綩ᅢ柷生큡䫧氃테ᒣ蘱锔䷶똓ⳗꄵ婨냄Ⱁ녜Ჵ胟㎺凓픰㢯㞥莖仃ዞ㋶咇挄鞰릥엘划襆תּ苲魱뀭濪䎔넑벛깈麳ԝ_馎㖕ꗞত릝祉碮軚좦អ⊯膏❄毊㳜䱤㬢ና஦㪂蘵챦䮕耉➝얄簤폆ᩨꦶ콽轡﫡ⷺ㒥Ϭ줰甂톘跧橱備렀裲▁鄥蔨⤟⳸ኼ枦∡ [ 1152.570629][ T9783] usb 6-1: Manufacturer: Ѓ [ 1152.578987][ T9783] usb 6-1: SerialNumber: 껗䑁ᐻ䱪驅☩턶콸ꗠ퀄埧๦론夺斲 [ 1152.604951][T20685] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1152.611963][T20685] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1153.113844][ T9783] cdc_ether: probe of 6-1:1.0 failed with error -71 [ 1153.128414][ T9783] usb 6-1: USB disconnect, device number 8 [ 1153.213743][T10708] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 1153.463821][T10708] usb 5-1: Using ep0 maxpacket: 8 [ 1153.663956][T10708] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1153.675032][T10708] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1153.692261][T10708] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1023 [ 1153.706353][T10708] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1153.719553][T10708] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1153.763700][T10708] usb 5-1: language id specifier not provided by device, defaulting to English [ 1153.883691][T10708] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1153.892786][T10708] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1153.900883][T10708] usb 5-1: Product: syz [ 1153.905307][T10708] usb 5-1: Manufacturer: 彴⚞ꕞ纒楉֒쬼掶뭒㜬Л偁ᨒ蜖ⲹ⊸龋㠄岨荚轛ୌ⊀쌁ལ [ 1153.920198][T10708] usb 5-1: SerialNumber: syz 05:19:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, 0x0, 0x0) 05:19:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, 0x0) 05:19:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, 0x0) 05:19:05 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000fff9) 05:19:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1154.163665][T10708] cdc_ncm 5-1:1.0: bind() failure [ 1154.171394][T10708] cdc_ncm 5-1:1.1: bind() failure 05:19:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f00000001c0)=""/191, &(0x7f0000000280)=0xbf) 05:19:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, 0x0) 05:19:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x22, 0x0, &(0x7f0000000080)) 05:19:05 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14}, 0xfffffffffffffeb4) [ 1154.210417][T10708] usb 5-1: USB disconnect, device number 15 05:19:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, 0x0, 0x0) 05:19:05 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000080)={0x0, {{0x2, 0x0, @local}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) 05:19:05 executing program 1: clock_gettime(0x5, &(0x7f0000000180)) 05:19:05 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x94000, 0x0) 05:19:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x101}, {&(0x7f00000001c0)="58465342c6b194ca44e7e059d8f6a56630c6c825a3a615264e44bebf9928c006485aa83c4d3e0b7247c685e1cfa9941d132fd346ddc60df324eecd154f2fc27ffd3bd8a73d335ab91ccbc649146708ad16b1a80d4469848adf5813185f5e608e02edc94c3c70d5", 0x67}], 0x0, 0x0) [ 1154.575751][ T34] audit: type=1804 audit(1605158346.105:419): pid=20809 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2069/cgroup.controllers" dev="sda1" ino=16377 res=1 errno=0 05:19:06 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:06 executing program 1: setrlimit(0x7, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) 05:19:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000100)="cb", 0x1) 05:19:06 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) syncfs(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) 05:19:06 executing program 2: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x290000, 0x0) 05:19:06 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 05:19:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, 0x0, 0x0) 05:19:06 executing program 2: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000040)="ae", 0x1) 05:19:06 executing program 5: r0 = socket(0x1, 0x5, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) 05:19:06 executing program 1: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 05:19:06 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x18000, 0x0) [ 1155.270937][ T34] audit: type=1804 audit(1605158346.795:420): pid=20843 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2070/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:19:07 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, &(0x7f0000000080)) 05:19:07 executing program 5: r0 = socket(0x1, 0x5, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000040), 0x0) 05:19:07 executing program 1: setrlimit(0x2, &(0x7f0000000040)) 05:19:07 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r1) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r1, 0x0, 0x4ff60, 0x0) 05:19:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLERRORu(r0, 0x0, 0xfffffeee) 05:19:07 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:07 executing program 4: 05:19:07 executing program 1: 05:19:07 executing program 5: 05:19:07 executing program 2: 05:19:07 executing program 4: open$dir(&(0x7f0000000780)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000800)='./file0\x00', 0x0, 0xffffffff) 05:19:07 executing program 1: getgroups(0x1, &(0x7f00000015c0)=[0x0]) 05:19:07 executing program 5: 05:19:07 executing program 2: 05:19:07 executing program 1: [ 1156.197742][ T34] audit: type=1804 audit(1605158347.725:421): pid=20880 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2071/cgroup.controllers" dev="sda1" ino=16313 res=1 errno=0 05:19:08 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r1) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r1, 0x0, 0x4ff60, 0x0) 05:19:08 executing program 2: 05:19:08 executing program 4: 05:19:08 executing program 5: 05:19:08 executing program 1: 05:19:08 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:08 executing program 2: 05:19:08 executing program 5: 05:19:08 executing program 4: 05:19:08 executing program 1: 05:19:08 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:08 executing program 2: 05:19:09 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r1) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r1, 0x0, 0x4ff60, 0x0) 05:19:09 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0806da7e809d5b"], 0x0) 05:19:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x21, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00576) shutdown(r2, 0x0) 05:19:09 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, @in, 0x400, 0x0, 0x201, 0x0, 0x1}, 0x98) 05:19:09 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:09 executing program 2: socket$inet_sctp(0x2, 0x3, 0x84) 05:19:09 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r1, r0, 0x0, 0x10000fff9) 05:19:09 executing program 1: syz_emit_ethernet(0x23, &(0x7f0000000140)={@local, @local, @val, {@ipv4}}, 0x0) 05:19:09 executing program 2: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) pipe2(&(0x7f0000000040), 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:19:09 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 05:19:09 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r1, r0, 0x0, 0x10000fff9) 05:19:09 executing program 1: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) chmod(&(0x7f0000000240)='./file1/../file0\x00', 0x0) 05:19:09 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x1, &(0x7f0000000100), 0x10) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00576) shutdown(r2, 0x0) 05:19:09 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r2, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r1, r0, 0x0, 0x10000fff9) 05:19:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000280)=[{&(0x7f00000000c0)='J', 0x1}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="100000008400000008"], 0x10}, 0x0) 05:19:09 executing program 1: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 05:19:09 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 05:19:10 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:10 executing program 1: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) 05:19:10 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000180)=@in={0x10, 0x2}, 0x10, 0x0}, 0x20100) 05:19:10 executing program 4: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) 05:19:10 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@random="a98e2067bf1b", @random="8371e74c3284", @val, {@ipv6}}, 0x0) [ 1158.595875][ T34] audit: type=1804 audit(1605158350.125:422): pid=20988 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2078/cgroup.controllers" dev="sda1" ino=16313 res=1 errno=0 05:19:10 executing program 1: syz_emit_ethernet(0x9a, &(0x7f0000000140)={@local, @local, @val, {@ipv4}}, 0x0) 05:19:10 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:10 executing program 5: msync(&(0x7f0000fee000/0x12000)=nil, 0x12002, 0x0) 05:19:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt(r0, 0x0, 0x3, 0x0, &(0x7f00000003c0)) 05:19:10 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@random="a98e2067bf1b", @random="8371e74c3284", @val, {@ipv6}}, 0x0) 05:19:10 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:10 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x180, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 05:19:10 executing program 4: socket$inet6_sctp(0x1c, 0x1, 0x84) socket$unix(0x1, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 05:19:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000240), &(0x7f0000000000)=0xa0) 05:19:10 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@sndinfo={0x1c}, @prinfo={0x14}, @init={0x14}, @sndrcv={0x2c}, @sndrcv={0x2c}, @sndinfo={0x1c}], 0xb8}, 0x0) 05:19:10 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 05:19:11 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000003c0)={0x0, @in, 0x400, 0x0, 0x201}, 0x98) 05:19:11 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) [ 1159.431905][ T34] audit: type=1804 audit(1605158350.955:423): pid=21021 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2079/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 05:19:11 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, 0x0, 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 05:19:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000340)=""/190, 0xbe}], 0x1) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e007ae) shutdown(r3, 0x0) r5 = socket(0x2, 0x1, 0x0) connect$unix(r5, &(0x7f00000007c0)=ANY=[@ANYBLOB="000200a718"], 0x10) shutdown(r4, 0x0) 05:19:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, &(0x7f00000000c0)="5a9171dd62b9470e85e01b0833f1d50045dd75f1c629c678d33bb1dfeb9f332e22bb977dccdcfe9810c27832573dc7c8c90d0e519b71a0da85853de8c3627c83082b7f0c46ca803678e99a16ed6c840f55e7ca1541e6a107efaef10fd1de0aaeed88adf1042841c1439dd970b4d22703a7c07ffac78cfcbfd9e53320e570c005d7d0b327e2b39ce3712ef0c0eb5da394818b90f05b20279562495e3a", 0xfffffcb7, 0x101, &(0x7f0000000180)=@in={0x10, 0x2}, 0x10) 05:19:11 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 05:19:11 executing program 1: symlink(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/73, 0x49) 05:19:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 05:19:11 executing program 5: syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="a98e2067bf1b8371e74c32840806000108000614"], 0x0) 05:19:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt(r0, 0x2, 0x0, 0x0, 0x0) 05:19:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x0) 05:19:11 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000300)={0x1c, 0x1c}, 0x1c) 05:19:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) [ 1160.292782][ T34] audit: type=1804 audit(1605158351.815:424): pid=21071 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2080/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 05:19:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7}, 0x14) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00576) shutdown(r2, 0x0) 05:19:12 executing program 2: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) chmod(&(0x7f0000000240)='./file1/../file0\x00', 0x0) 05:19:12 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r1) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ff60, 0x0) 05:19:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='cubic\x00', 0x6) 05:19:12 executing program 3: pipe(&(0x7f0000000140)) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:12 executing program 4: madvise(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x5) 05:19:12 executing program 2: syz_emit_ethernet(0xc2, &(0x7f0000000340)={@local, @empty, @val, {@ipv4}}, 0x0) 05:19:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000180)={0x0, 0x5600}, 0x10) writev(r0, 0x0, 0x0) 05:19:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sync() dup(0xffffffffffffffff) 05:19:12 executing program 2: pipe2(&(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 05:19:12 executing program 4: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) [ 1161.184038][ T34] audit: type=1804 audit(1605158352.715:425): pid=21115 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2081/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 05:19:12 executing program 2: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 05:19:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7}, 0x14) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00576) shutdown(r2, 0x0) 05:19:13 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@random="a98e2067bf1b", @random="8371e74c3284", @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @remote={0xac, 0x14, 0x0}, @broadcast, @rand_addr=0x7}}}}, 0x0) 05:19:13 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r1) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ff60, 0x0) 05:19:13 executing program 2: open(0x0, 0x8521e187c8862ec4, 0x0) 05:19:13 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000001380)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x7, 0x3, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x20}}, {{0x9, 0x5, 0x3, 0x2, 0x20}}}}}]}}]}}, 0x0) 05:19:13 executing program 3: pipe(&(0x7f0000000140)) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/223, 0xdf}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000280)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)=""/107, 0x6b}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x40022) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r1, 0x0) r4 = socket(0x2, 0x1, 0x0) connect$unix(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="000200cbae"], 0x10) shutdown(r3, 0x0) 05:19:13 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000340)={@local, @empty, @val, {@ipv4}}, 0x0) 05:19:13 executing program 2: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x50, &(0x7f00000000c0)="c1a766e8ddd21d90e42f11f47641f4cc9be05d890d01e1cdd2f68fb07a25dff52ded3afbe8703df5ac570de3aa180a651e62994b813867bfa3074d2e1f49b086bd6586be7ded0b98310469639c7206788b55eb71f957b4965f022e186ede70df7b21e1a317a185aa32aec446fb931349d09e1f25a26a5d15bb43177095c84a7471769fa2508885c3", 0x88) 05:19:13 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="91", 0xfffffffffffffdd5}], 0x1, &(0x7f00000013c0)=ANY=[], 0x178}, 0x0) [ 1162.048298][ T34] audit: type=1804 audit(1605158353.575:426): pid=21155 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2082/cgroup.controllers" dev="sda1" ino=16133 res=1 errno=0 05:19:13 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000340)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 05:19:13 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) [ 1162.242868][T10708] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 1162.482863][T10708] usb 5-1: Using ep0 maxpacket: 8 [ 1162.603238][T10708] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 32 [ 1162.614342][T10708] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 32 [ 1162.624399][T10708] usb 5-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1162.640229][T10708] usb 5-1: config 1 interface 0 has no altsetting 0 05:19:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x6a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:19:14 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:14 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r1) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ff60, 0x0) 05:19:14 executing program 3: pipe(&(0x7f0000000140)) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1162.803135][T10708] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1162.815676][T10708] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1162.839426][T10708] usb 5-1: Product: syz [ 1162.850519][T10708] usb 5-1: Manufacturer: syz [ 1162.855747][T10708] usb 5-1: SerialNumber: syz [ 1162.873583][T21157] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1162.873787][ T34] audit: type=1804 audit(1605158354.406:427): pid=21208 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2083/cgroup.controllers" dev="sda1" ino=15907 res=1 errno=0 [ 1162.883393][T21157] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1163.164006][T10708] cdc_ether: probe of 5-1:1.0 failed with error -71 [ 1163.175787][T10708] usb 5-1: USB disconnect, device number 16 [ 1163.922747][ T4886] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 1164.182746][ T4886] usb 5-1: Using ep0 maxpacket: 8 [ 1164.323431][ T4886] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 32 [ 1164.333593][ T4886] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 32 [ 1164.351327][ T4886] usb 5-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1164.367762][ T4886] usb 5-1: config 1 interface 0 has no altsetting 0 [ 1164.543466][ T4886] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1164.552554][ T4886] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1164.564413][ T4886] usb 5-1: Product: syz [ 1164.571903][ T4886] usb 5-1: Manufacturer: syz [ 1164.576654][ T4886] usb 5-1: SerialNumber: syz [ 1164.593915][T21157] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1164.600972][T21157] raw-gadget gadget: fail, usb_ep_enable returned -22 05:19:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_SET_CPUID(r2, 0xae80, 0x0) 05:19:16 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="1f63838bf9664c3fdc8ee5d605ff01000066085e4f26016c34b5d4216f8fbdbc8e753912845b4eab4b0700000000000000bd0979809702beb62641eb024b49d9dbfbff010000a8da91220f71066c2ec4dfed01f2e6a325b8b4a3c39c90e7fe129a342351c98f00007540bf070da4b073201d2c015a9a0fe9fe0c231ebfbe0c041173fab667ec6c9027fe3e4e66cc7f7ae712d8d1bc57251e06e13e695df540eaf454ae242f034c6b77687271eefbf9c5694f060f77dd62f4d128b5fb95a6fa6c2aded3fd8ee6f3d0414f321fedbb6f7cefa4f938e5c106b4ce5ac14c6e0147bdeda0a4eb6ac6de96d158188fc52b35b4975dabf80cdd39b7d5", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:19:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:16 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ff60, 0x0) [ 1164.823832][ T4886] cdc_ether: probe of 5-1:1.0 failed with error -71 [ 1164.839425][ T4886] usb 5-1: USB disconnect, device number 17 05:19:16 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:16 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) [ 1164.895578][T21241] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. [ 1164.971640][ T34] audit: type=1804 audit(1605158356.496:428): pid=21246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2084/cgroup.controllers" dev="sda1" ino=16376 res=1 errno=0 05:19:16 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:17 executing program 1: 05:19:17 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sched_setscheduler(0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(r0, 0x3f) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000000500)=ANY=[@ANYBLOB="3e0a0000000000007f3500"/62944]) 05:19:17 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ff60, 0x0) 05:19:17 executing program 2: write(0xffffffffffffffff, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) [ 1165.904311][ T34] audit: type=1804 audit(1605158357.436:429): pid=21280 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2085/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:19:19 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@srh, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000240)=ANY=[], 0x10) 05:19:19 executing program 4: 05:19:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e2389ceae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7", 0x3d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 05:19:19 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:19 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ff60, 0x0) 05:19:19 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:19 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2000, 0x1) 05:19:19 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:19 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:19 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@srh, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000240)=ANY=[], 0x10) [ 1167.967444][ T34] audit: type=1804 audit(1605158359.496:430): pid=21297 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2086/cgroup.controllers" dev="sda1" ino=16311 res=1 errno=0 05:19:19 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:19 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:19 executing program 2: socket$inet(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:22 executing program 1: 05:19:22 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:22 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:22 executing program 2: socket$inet(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:22 executing program 3: pipe(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:22 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 05:19:22 executing program 2: socket$inet(0x10, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b60000", 0x24) 05:19:22 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:22 executing program 5: 05:19:22 executing program 1: 05:19:22 executing program 5: 05:19:22 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:22 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, 0x0, 0x0) [ 1170.998121][ T34] audit: type=1804 audit(1605158362.526:431): pid=21339 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2087/cgroup.controllers" dev="sda1" ino=16308 res=1 errno=0 05:19:22 executing program 1: 05:19:22 executing program 5: 05:19:22 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, 0x0, 0x0) 05:19:22 executing program 3: pipe(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1171.307620][ T34] audit: type=1804 audit(1605158362.836:432): pid=21364 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2088/cgroup.controllers" dev="sda1" ino=16309 res=1 errno=0 05:19:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 05:19:23 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:23 executing program 1: 05:19:23 executing program 5: 05:19:23 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, 0x0, 0x0) 05:19:23 executing program 3: pipe(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:23 executing program 5: 05:19:23 executing program 1: 05:19:23 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040), 0x0) 05:19:23 executing program 4: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 05:19:23 executing program 5: 05:19:23 executing program 5: [ 1171.864929][ T34] audit: type=1804 audit(1605158363.396:433): pid=21379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2089/cgroup.controllers" dev="sda1" ino=16309 res=1 errno=0 05:19:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff3900020200000000100f0007e1000c080017", 0x1f) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x1000001b3) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 05:19:24 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040), 0x0) 05:19:24 executing program 1: 05:19:24 executing program 4: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 05:19:24 executing program 5: 05:19:24 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:24 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040), 0x0) 05:19:24 executing program 5: 05:19:24 executing program 4: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 05:19:24 executing program 1: [ 1172.703546][ T34] audit: type=1804 audit(1605158364.236:434): pid=21410 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2090/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:24 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b0000", 0x12) 05:19:24 executing program 5: 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b0000", 0x12) 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:25 executing program 5: 05:19:25 executing program 1: 05:19:25 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:25 executing program 0: 05:19:25 executing program 1: 05:19:25 executing program 5: 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b0000", 0x12) 05:19:25 executing program 0: 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) [ 1173.597755][ T34] audit: type=1804 audit(1605158365.127:435): pid=21434 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2091/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:25 executing program 5: 05:19:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000240)="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", 0xff}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000020c0)="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", 0xf02}], 0x3}, 0x0) 05:19:25 executing program 0: 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b0000050300000000000000", 0x1b) 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:25 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000012c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c06, 0x0) 05:19:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @l2tp, @in={0x2, 0x0, @empty}, @phonet, 0x405}) 05:19:25 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x802, 0x0) 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b0000050300000000000000", 0x1b) 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 05:19:25 executing program 5: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000780)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\xb1]b\xad1\xf4\x055`\xd0\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcuj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+r\xa0\xde\xa8W\x03\x9b;', 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() process_vm_writev(r1, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/231, 0xe7}], 0x1, &(0x7f0000000040)=[{&(0x7f0000000680)=""/123, 0x7b}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b0000050300000000000000", 0x1b) [ 1173.930148][ T34] audit: type=1804 audit(1605158365.457:436): pid=21459 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2092/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:19:25 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:25 executing program 0: semtimedop(0x0, &(0x7f0000000040)=[{}, {}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000300)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000340)) 05:19:25 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:25 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900", 0x20) 05:19:25 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0, 0x4d}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @loopback}}]}, 0x2c}}, 0x0) 05:19:25 executing program 1: r0 = socket(0x2, 0x3, 0x9) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x36}}, 0x10, 0x0}, 0x24004814) 05:19:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0), 0x4) 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) [ 1174.201882][T21502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900", 0x20) 05:19:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='comm\x00') exit_group(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') [ 1174.250026][T21506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1174.265248][ T34] audit: type=1804 audit(1605158365.797:437): pid=21507 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2093/cgroup.controllers" dev="sda1" ino=16301 res=1 errno=0 05:19:25 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900", 0x20) 05:19:25 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:25 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x22, &(0x7f00000003c0)={@multicast, @random="001d1f00", @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @remote, "", @broadcast}}}}, 0x0) 05:19:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6c, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0x7, 0xb7, [@dev]}, @timestamp={0x44, 0x4, 0x0, 0x3}]}}}}}}, 0x0) 05:19:25 executing program 0: request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='!\xf4-\x00', 0xfffffffffffffffe) 05:19:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b6", 0x22) 05:19:26 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r3, r4, 0x0, 0x7fffffff) 05:19:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b6", 0x22) 05:19:26 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa0001, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:19:26 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9201, 0x0) 05:19:26 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x30b042, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9}, 0x0, 0x0, 0x0, 0x0) 05:19:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b6", 0x22) [ 1174.572482][ T34] audit: type=1804 audit(1605158366.107:438): pid=21538 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2094/cgroup.controllers" dev="sda1" ino=16377 res=1 errno=0 05:19:26 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:26 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x1e8, 0xe0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x178, 0xffffffff, 0xffffffff, 0x178, 0xffffffff, 0x3, 0x0, {[{{@ip={@multicast2, @loopback, 0x0, 0x0, 'team_slave_0\x00', 'wg0\x00', {}, {}, 0x0, 0x6}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'team_slave_0\x00', 'dummy0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x248) 05:19:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x15) 05:19:26 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000005, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000000000)) 05:19:26 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 05:19:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b600", 0x23) 05:19:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4045, 0x0, 0x0) 05:19:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b600", 0x23) 05:19:26 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 05:19:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x0, 0x1f0, 0x0, 0xffffffff, 0xffffffff, 0x2e0, 0x2e0, 0x2e0, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev, @private2, [], [], 'ip6gre0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@loopback, @mcast2, [], [], 'veth1_vlan\x00', 'veth0_vlan\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 'veth1_macvtap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000000100)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x0) 05:19:26 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 05:19:26 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00'/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c00128009000100626f6e64000000000c0002"], 0x3c}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00001000280012800a00010076786c616e"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) [ 1174.905958][ T34] audit: type=1804 audit(1605158366.437:439): pid=21571 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2095/cgroup.controllers" dev="sda1" ino=16366 res=1 errno=0 [ 1174.931190][T21588] x_tables: duplicate underflow at hook 2 [ 1174.939617][T21589] x_tables: duplicate underflow at hook 2 [ 1174.978368][T21591] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1174.998955][T21591] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:19:26 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:26 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="240000001e005f0214fffffffff8071b00000503000000000000000008000900e5b600", 0x23) 05:19:26 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9201, 0x0) 05:19:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) 05:19:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, r1, 0x329}, 0x14}}, 0x0) 05:19:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)={0x2c, 0xa, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 05:19:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x40, 0x4) 05:19:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="020a040007000000b6f1ffff0000854105001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020ae2080e"], 0x70}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x3ef, 0x0) 05:19:26 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0x22, 0x0, 0x0) 05:19:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x4, 0x408, 0xffffffff, 0x0, 0x190, 0xc8, 0xffffffff, 0xffffffff, 0x370, 0x370, 0x370, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'gre0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'bond_slave_1\x00', {}, {}, 0x84}, 0x0, 0x1b8, 0x1e0, 0x0, {}, [@common=@inet=@sctp={{0x148, 'sctp\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x4, 0x408, 0xffffffff, 0x0, 0x190, 0xc8, 0xffffffff, 0xffffffff, 0x370, 0x370, 0x370, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'gre0\x00', 'veth0_virt_wifi\x00'}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'vlan0\x00', 'bond_slave_1\x00', {}, {}, 0x84}, 0x0, 0x1b8, 0x1e0, 0x0, {}, [@common=@inet=@sctp={{0x148, 'sctp\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) 05:19:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x24084054, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x10) [ 1175.194950][ T34] audit: type=1804 audit(1605158366.727:440): pid=21609 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2096/cgroup.controllers" dev="sda1" ino=16307 res=1 errno=0 [ 1175.305775][T21620] x_tables: duplicate underflow at hook 2 [ 1175.311743][T21620] x_tables: duplicate underflow at hook 2 [ 1175.320162][T21621] x_tables: duplicate underflow at hook 2 [ 1175.326192][T21621] x_tables: duplicate underflow at hook 2 05:19:27 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) r0 = gettid() r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) setsockopt$inet_int(r1, 0x0, 0xd, &(0x7f00000000c0)=0x80, 0x4) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0xc00) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f0000000bc0)) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r5, 0x0, 0x40014) tkill(r0, 0x1000000000016) 05:19:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0xa7f5abe05f72625f, 0x0) 05:19:27 executing program 2: r0 = socket(0xa, 0x3, 0xd) bind$packet(r0, 0x0, 0x0) 05:19:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 05:19:27 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x880c1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x2f}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040), 0x4) 05:19:27 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:27 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0x3, 0x0, 0x0) 05:19:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_snmp6\x00') fcntl$notify(r0, 0x402, 0x698b4796e327f9d9) 05:19:27 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) pipe2(&(0x7f0000000100), 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 05:19:27 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x84801, 0x0) [ 1175.846523][ T34] audit: type=1804 audit(1605158367.377:441): pid=21637 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2097/cgroup.controllers" dev="sda1" ino=16313 res=1 errno=0 05:19:27 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x7ff}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 05:19:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000022000106"], 0x28}}, 0x0) 05:19:28 executing program 1: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0xf, 0x0, 0x0) 05:19:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$packet(r0, 0x0, 0x0) 05:19:28 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000100)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x10) 05:19:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000180)={0x0, 0x0, 0x0}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x0, 0x0, 0x0}) 05:19:28 executing program 2: r0 = semget$private(0x0, 0x1, 0x0) semtimedop(r0, &(0x7f0000000200)=[{0x0, 0x7ff}, {}], 0x2, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 05:19:28 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:28 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x54) 05:19:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 05:19:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 05:19:28 executing program 1: sendto$inet(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) 05:19:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)={r1}, 0x0, 0x0) [ 1176.740442][ T34] audit: type=1804 audit(1605158368.267:442): pid=21675 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2098/cgroup.controllers" dev="sda1" ino=16314 res=1 errno=0 05:19:28 executing program 4: r0 = socket(0x2, 0x3, 0x9) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10, 0x0}, 0x0) 05:19:28 executing program 1: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0x12, 0x0, 0x0) 05:19:28 executing program 0: r0 = socket(0x2, 0x2, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 05:19:28 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) 05:19:28 executing program 1: 05:19:28 executing program 0: 05:19:28 executing program 0: 05:19:28 executing program 5: 05:19:28 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:28 executing program 4: 05:19:28 executing program 1: [ 1177.199443][ T34] audit: type=1804 audit(1605158368.727:443): pid=21724 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2099/cgroup.controllers" dev="sda1" ino=16307 res=1 errno=0 05:19:29 executing program 2: 05:19:29 executing program 4: 05:19:29 executing program 0: 05:19:29 executing program 5: 05:19:29 executing program 1: 05:19:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:29 executing program 0: 05:19:29 executing program 4: 05:19:29 executing program 5: 05:19:29 executing program 1: 05:19:29 executing program 0: 05:19:29 executing program 2: 05:19:29 executing program 1: 05:19:29 executing program 4: 05:19:29 executing program 5: 05:19:29 executing program 0: 05:19:29 executing program 2: [ 1177.673441][ T34] audit: type=1804 audit(1605158369.207:444): pid=21741 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2100/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:19:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:29 executing program 1: 05:19:29 executing program 0: 05:19:29 executing program 4: 05:19:29 executing program 5: 05:19:29 executing program 2: 05:19:29 executing program 5: 05:19:29 executing program 0: 05:19:29 executing program 4: 05:19:29 executing program 1: 05:19:29 executing program 2: 05:19:29 executing program 0: 05:19:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:29 executing program 5: 05:19:29 executing program 1: 05:19:29 executing program 4: 05:19:29 executing program 2: 05:19:29 executing program 0: 05:19:29 executing program 1: 05:19:29 executing program 0: 05:19:29 executing program 4: 05:19:29 executing program 5: 05:19:29 executing program 2: 05:19:29 executing program 0: 05:19:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:29 executing program 1: 05:19:29 executing program 4: 05:19:29 executing program 2: 05:19:29 executing program 5: 05:19:29 executing program 0: 05:19:30 executing program 0: 05:19:30 executing program 2: 05:19:30 executing program 4: 05:19:30 executing program 5: 05:19:30 executing program 1: 05:19:30 executing program 2: [ 1178.607988][ T34] kauditd_printk_skb: 2 callbacks suppressed [ 1178.608040][ T34] audit: type=1804 audit(1605158370.137:447): pid=21801 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2103/cgroup.controllers" dev="sda1" ino=16309 res=1 errno=0 05:19:30 executing program 5: 05:19:30 executing program 0: 05:19:30 executing program 4: 05:19:30 executing program 2: 05:19:30 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:30 executing program 1: 05:19:30 executing program 1: 05:19:30 executing program 2: 05:19:30 executing program 4: 05:19:30 executing program 0: 05:19:30 executing program 5: 05:19:30 executing program 1: 05:19:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$notify(r0, 0x402, 0x698b4796e327f9d9) 05:19:30 executing program 0: 05:19:30 executing program 1: 05:19:30 executing program 5: [ 1178.918415][ T34] audit: type=1804 audit(1605158370.447:448): pid=21815 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2104/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:30 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:30 executing program 4: 05:19:30 executing program 0: 05:19:30 executing program 1: 05:19:30 executing program 5: 05:19:30 executing program 2: 05:19:30 executing program 1: 05:19:30 executing program 4: 05:19:30 executing program 2: 05:19:30 executing program 0: 05:19:30 executing program 5: 05:19:30 executing program 2: [ 1179.279942][ T34] audit: type=1804 audit(1605158370.807:449): pid=21838 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2105/cgroup.controllers" dev="sda1" ino=16301 res=1 errno=0 05:19:30 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:30 executing program 0: 05:19:30 executing program 1: 05:19:30 executing program 4: 05:19:30 executing program 5: 05:19:30 executing program 2: 05:19:31 executing program 0: 05:19:31 executing program 5: 05:19:31 executing program 2: 05:19:31 executing program 1: 05:19:31 executing program 4: 05:19:31 executing program 1: [ 1179.584841][ T34] audit: type=1804 audit(1605158371.117:450): pid=21855 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2106/cgroup.controllers" dev="sda1" ino=16301 res=1 errno=0 05:19:31 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:31 executing program 0: 05:19:31 executing program 5: 05:19:31 executing program 2: 05:19:31 executing program 4: 05:19:31 executing program 1: 05:19:31 executing program 1: 05:19:31 executing program 0: 05:19:31 executing program 5: 05:19:31 executing program 4: 05:19:31 executing program 2: 05:19:31 executing program 0: [ 1179.943942][ T34] audit: type=1804 audit(1605158371.477:451): pid=21873 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2107/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:31 executing program 1: 05:19:31 executing program 5: 05:19:31 executing program 2: 05:19:31 executing program 4: 05:19:31 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:31 executing program 0: 05:19:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=@delqdisc={0x24, 0x25, 0x1}, 0x24}}, 0x0) 05:19:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000040)={'vlan0\x00', @ifru_data=&(0x7f0000000080)="f1a67864bde0042e40d15800"}) bind(0xffffffffffffffff, &(0x7f00000000c0)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80) 05:19:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$unix(r0, 0x0, 0x17) 05:19:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000002c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x4}, 0x14) 05:19:31 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x8804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2008}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:19:31 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2008}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:19:31 executing program 0: madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0xe) mincore(&(0x7f0000677000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/233) 05:19:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@getqdisc={0x24, 0x26, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 1180.294491][ T34] audit: type=1804 audit(1605158371.827:452): pid=21896 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2108/cgroup.controllers" dev="sda1" ino=16301 res=1 errno=0 05:19:31 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000140)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x60, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [0x0, 0xff], {0x0, 0x6, '$\x00@', 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [@routing={0x34, 0x4, 0x0, 0x6, 0x0, [@mcast1, @private0]}], "050c68deb1caadea"}}}}}}}, 0x0) 05:19:32 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:32 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) syncfs(r1) 05:19:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) 05:19:32 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:32 executing program 2: madvise(&(0x7f00006b1000/0x400000)=nil, 0x400000, 0xe) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000a21000/0x3000)=nil, 0x3) 05:19:32 executing program 5: sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:19:32 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000002c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x8}, 0x14) 05:19:32 executing program 0: madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0xe) mbind(&(0x7f0000080000/0x5000)=nil, 0x5000, 0x3, &(0x7f0000000100)=0x401, 0xf06, 0x1) 05:19:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x34, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 05:19:32 executing program 5: mprotect(&(0x7f0000a14000/0x2000)=nil, 0x2000, 0x4) mremap(&(0x7f0000a14000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000a15000/0x4000)=nil) 05:19:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x4}, 0x1c}}, 0x0) recvmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000003fc0)={0x0, 0x3938700}) [ 1180.629573][ T34] audit: type=1804 audit(1605158372.157:453): pid=21934 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2109/cgroup.controllers" dev="sda1" ino=15809 res=1 errno=0 05:19:32 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$unix(r0, 0x0, 0x0) 05:19:32 executing program 1: madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0xe) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000001480)='W') mlock2(&(0x7f0000166000/0x4000)=nil, 0x4000, 0x0) 05:19:32 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @broadcast}, {0x17, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:19:32 executing program 0: socketpair(0xa, 0x2, 0x0, 0x0) 05:19:32 executing program 4: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='macvlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) 05:19:32 executing program 2: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) [ 1180.856660][T21965] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1180.868365][ T34] audit: type=1804 audit(1605158372.397:454): pid=21960 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2110/cgroup.controllers" dev="sda1" ino=15842 res=1 errno=0 05:19:32 executing program 4: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) [ 1180.904952][T21965] bridge1: port 1(syz_tun) entered blocking state 05:19:32 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) 05:19:32 executing program 0: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) [ 1180.934868][T21965] bridge1: port 1(syz_tun) entered disabled state [ 1180.980933][T21978] bridge1: port 1(syz_tun) entered blocking state [ 1180.989236][T21978] bridge1: port 1(syz_tun) entered forwarding state [ 1181.012044][T21965] bridge1: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 1181.081536][T21978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1181.094717][T21978] bridge1: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) 05:19:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5b) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000300), 0x4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 05:19:32 executing program 4: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006640)={&(0x7f0000000540)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, [@etimer_thresh={0x8}, @policy_type={0xa}]}, 0xcc}}, 0x0) 05:19:32 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @broadcast}, {0x17, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:19:32 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x86) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="66696c74657200000000f7ffffffffffffff00000000000000000000000000000e00000004000000cc02000074020000b0000000b000000000000000b0000000080300003802000038020000380200000803ef00040000000000000000000000000000000000000000000000000000000000000000000900000000000000000000003bba0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040004c4f470000000000000000000000000000000000000000000000000000000000a6fe86583a0c9da81c652b77a96d3e38ada3dbf9bc2d9b05778350aea1000000000000000000000000000000000000000000000000000000000000f1ffffff000000df0000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000009400f400000000000000ecffffff00000000000000000000240065636e0000000000000000008b000007f100010000000000000000000000010000006000534554000000000800000000000010000000000000000000000000000000000000004cb090f6315808a28a3112000000000000000000000000000000000000000000000052994e8ae86cce53000000000000000000000000000010830000e0000001e00000010000660ec80fdbd3ab0c36746e6c30000000000000000000776731000000000000160000deffffffffffff0f002000000000000000000000000000000000ffff000000000000000000000000200000007000940000000000000000000000000000000000000000fe240052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000700094000000000000000000000000000000000000000000240000000000000000000000000000150000000000f7ff000000000000000000feffffff"], 0x1) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) [ 1181.192615][T21996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1181.207679][T21998] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1181.253982][T21998] bridge1: port 1(syz_tun) entered disabled state [ 1181.281294][T21998] bridge2: port 1(syz_tun) entered blocking state [ 1181.297858][T21998] bridge2: port 1(syz_tun) entered disabled state [ 1181.312568][ T34] audit: type=1804 audit(1605158372.837:455): pid=22000 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2111/cgroup.controllers" dev="sda1" ino=15782 res=1 errno=0 [ 1181.348563][T22008] bridge2: port 1(syz_tun) entered blocking state [ 1181.355054][T22008] bridge2: port 1(syz_tun) entered forwarding state [ 1181.366603][T21998] bridge2: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) 05:19:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_hsr\x00', 0xfffffffffffffe5e) 05:19:33 executing program 2: openat$autofs(0xffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) madvise(&(0x7f00006b1000/0x400000)=nil, 0x400000, 0xe) sigaltstack(&(0x7f0000832000/0x2000)=nil, 0x0) 05:19:33 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mlock(&(0x7f0000001000/0x3000)=nil, 0x3000) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104000000000000000000009c08", @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x1a20d}}, 0x20}}, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @broadcast}, {0x17, 0x0, 0x0, @multicast1}}}}}, 0x0) 05:19:33 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:33 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 05:19:33 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) 05:19:33 executing program 1: get_thread_area(&(0x7f0000000040)) mremap(&(0x7f0000a15000/0x2000)=nil, 0x2000, 0x400000, 0x3, &(0x7f0000c00000/0x400000)=nil) madvise(&(0x7f0000e6c000/0x1000)=nil, 0x1000, 0xe) [ 1181.764896][T22022] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 05:19:33 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 1181.833113][T22027] bridge2: port 1(syz_tun) entered disabled state [ 1181.858492][ T34] audit: type=1804 audit(1605158373.387:456): pid=22024 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2112/cgroup.controllers" dev="sda1" ino=16163 res=1 errno=0 05:19:33 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 1181.892354][T22027] bridge3: port 1(syz_tun) entered blocking state [ 1181.917873][T22027] bridge3: port 1(syz_tun) entered disabled state 05:19:33 executing program 1: madvise(&(0x7f0000a14000/0x2000)=nil, 0x2000, 0xe) mlock(&(0x7f0000a15000/0x1000)=nil, 0x1000) [ 1181.939094][T22022] bridge3: port 1(syz_tun) entered blocking state [ 1181.945560][T22022] bridge3: port 1(syz_tun) entered forwarding state 05:19:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874", 0x45}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000440)="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", 0x108}], 0x1}, 0x8000) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0e", 0x29b}], 0x1}, 0x0) 05:19:33 executing program 4: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x4000031, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 05:19:33 executing program 5: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x33c, 0x1d8, 0x1ac, 0xd8, 0x0, 0x1d8, 0x2d4, 0x274, 0x274, 0x274, 0x2d4, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xd8}, @common=@inet=@SET3={0x34, 'SET\x00', 0x3, {{}, {}, {0xffffffffffffffff}}}}, {{@ipv6={@remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], '\x00', 'bond0\x00'}, 0x0, 0xa4, 0xd4}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @remote, [], [], 'geneve0\x00', 'veth1_virt_wifi\x00'}, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x398) 05:19:33 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x6e, &(0x7f0000000140)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [0x0, 0xff], {0x0, 0x6, '$\x00@', 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [], "050c68deb1caadea"}}}}}}}, 0x0) 05:19:33 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:33 executing program 1: madvise(&(0x7f00006b1000/0x400000)=nil, 0x400000, 0xe) sigaltstack(&(0x7f0000931000/0x1000)=nil, 0x0) mincore(&(0x7f000085e000/0x1000)=nil, 0x1000, &(0x7f0000003fc0)=""/139) 05:19:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=@gettfilter={0x24, 0x2e, 0x1}, 0x24}}, 0x0) 05:19:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) setsockopt$sock_timeval(r0, 0x1, 0xa, &(0x7f0000000080)={r1}, 0x8) 05:19:34 executing program 5: r0 = socket(0x26, 0x5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 05:19:34 executing program 0: clock_adjtime(0x0, &(0x7f0000000140)={0x8f23}) 05:19:34 executing program 1: sigaltstack(&(0x7f0000a24000/0x2000)=nil, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000a24000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) 05:19:34 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4008805) 05:19:34 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae16917"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000002c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 05:19:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 05:19:34 executing program 1: r0 = openat$dir(0xffffff9c, &(0x7f0000000380)='./file0\x00', 0x40, 0x0) name_to_handle_at(r0, &(0x7f0000000140)='\x00', 0x0, 0x0, 0x1000) 05:19:34 executing program 2: socketpair(0x22, 0x0, 0xd4, &(0x7f0000000200)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz0\x00', 0x1ff) openat$cgroup_ro(r1, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) 05:19:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x8, 0x6c5, 0x0, 0x0, 0x1}, 0x40) 05:19:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000140)=""/151, 0x28, 0x97, 0x1}, 0x20) 05:19:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff97b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:19:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001280)={0x1, 0x7, 0x2, 0x4}, 0x40) 05:19:34 executing program 1: socketpair(0xa, 0x2, 0x73, &(0x7f0000000000)) 05:19:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 05:19:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r2}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 05:19:34 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae16917"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1c}, 0x40) 05:19:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001280)={0x1, 0x7, 0x2, 0x6902, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 05:19:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x48be, 0x0, 0x10001, 0x0, 0x1}, 0x40) 05:19:34 executing program 5: socketpair(0x22, 0x2, 0x10, &(0x7f0000000200)) 05:19:34 executing program 1: 05:19:34 executing program 1: 05:19:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r2}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) [ 1183.230064][T22133] delete_channel: no stack 05:19:34 executing program 1: [ 1183.253339][T22133] delete_channel: no stack 05:19:34 executing program 4: [ 1183.287393][T22133] delete_channel: no stack [ 1183.314799][T22133] delete_channel: no stack 05:19:35 executing program 2: 05:19:35 executing program 1: 05:19:35 executing program 4: 05:19:35 executing program 5: 05:19:35 executing program 0: 05:19:35 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae16917"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:35 executing program 0: 05:19:35 executing program 5: 05:19:35 executing program 4: 05:19:35 executing program 1: 05:19:35 executing program 2: 05:19:35 executing program 0: [ 1183.900261][ T34] kauditd_printk_skb: 3 callbacks suppressed [ 1183.900275][ T34] audit: type=1804 audit(1605158375.428:460): pid=22149 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2116/cgroup.controllers" dev="sda1" ino=16307 res=1 errno=0 05:19:35 executing program 5: 05:19:35 executing program 1: 05:19:35 executing program 4: 05:19:35 executing program 0: 05:19:35 executing program 2: 05:19:35 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:35 executing program 5: 05:19:35 executing program 1: 05:19:35 executing program 4: 05:19:35 executing program 0: 05:19:35 executing program 2: 05:19:35 executing program 1: 05:19:35 executing program 5: 05:19:35 executing program 0: 05:19:35 executing program 4: 05:19:35 executing program 2: [ 1184.269823][ T34] audit: type=1804 audit(1605158375.798:461): pid=22173 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2117/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 05:19:35 executing program 5: 05:19:35 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:35 executing program 1: 05:19:35 executing program 0: 05:19:35 executing program 4: 05:19:35 executing program 2: 05:19:35 executing program 5: 05:19:36 executing program 5: 05:19:36 executing program 0: 05:19:36 executing program 4: 05:19:36 executing program 2: 05:19:36 executing program 1: 05:19:36 executing program 5: [ 1184.586936][ T34] audit: type=1804 audit(1605158376.118:462): pid=22190 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2118/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:36 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:36 executing program 0: 05:19:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000001c0)=0x8, 0x4) 05:19:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000004c0)={0x0, 0x5, 0x3, [0x0, 0x0, 0x0]}, 0xe) 05:19:36 executing program 1: r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/11, 0x26d) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) r2 = dup(r1) ioctl$TUNSETGROUP(r2, 0x400454ce, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x401004000000016) 05:19:36 executing program 5: 05:19:36 executing program 4: 05:19:36 executing program 2: 05:19:36 executing program 5: 05:19:36 executing program 0: 05:19:36 executing program 5: 05:19:36 executing program 0: [ 1184.914130][ T34] audit: type=1804 audit(1605158376.448:463): pid=22211 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2119/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:19:36 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:36 executing program 4: 05:19:36 executing program 1: 05:19:36 executing program 2: 05:19:36 executing program 5: 05:19:36 executing program 0: 05:19:36 executing program 1: 05:19:36 executing program 5: 05:19:36 executing program 2: 05:19:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r0, &(0x7f0000000680), &(0x7f00000006c0)=0x10, 0x0) 05:19:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000040)="d7", 0x1}], 0x1, &(0x7f0000000540)=[@sndrcv={0x2c}], 0x2c}, 0x0) 05:19:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@in6={0x0, 0x1c, 0x2}, 0x10) [ 1185.320873][ T34] audit: type=1804 audit(1605158376.848:464): pid=22234 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2120/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:37 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) r7 = dup2(r6, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000080)={r8, 0x0, 0x1, 'w'}, 0x9) 05:19:37 executing program 5: 05:19:37 executing program 4: 05:19:37 executing program 2: getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x29, 0x0, 0x0) 05:19:37 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000100)={@remote={0xac, 0x14, 0x0}, @broadcast}, 0xc) 05:19:37 executing program 5: nanosleep(&(0x7f0000000140)={0xfffffffb}, 0x0) 05:19:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)}, 0x2) 05:19:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000240)="d7", 0x1}], 0x1}, 0x0) 05:19:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) r7 = dup2(r6, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000080)={r8}, 0x8) 05:19:37 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xd, &(0x7f0000000100), 0x4) [ 1185.636551][ T34] audit: type=1804 audit(1605158377.168:465): pid=22260 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2121/cgroup.controllers" dev="sda1" ino=16366 res=1 errno=0 05:19:37 executing program 0: r0 = socket(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000180)=@un=@file={0xa}, 0xa) 05:19:37 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:37 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000040)={0x0, 0x6}, 0x8) 05:19:37 executing program 0: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0a3a00000000a5"], 0xa) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 05:19:37 executing program 4: select(0x40, &(0x7f0000000000)={0xfffc}, 0x0, 0x0, 0x0) 05:19:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000040)='K', 0x1}], 0x1, &(0x7f0000000540)=[@prinfo={0x14, 0x84, 0x7, {0x2}}, @init={0x14}, @sndrcv={0x2c}, @dstaddrv4={0x10}, @authinfo={0x10}], 0x74}, 0x0) 05:19:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="df", 0x1}], 0x1, &(0x7f0000000680)=[@sndinfo={0x1c}, @sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1000}}], 0x38}, 0x0) [ 1186.047401][ T34] audit: type=1804 audit(1605158377.578:466): pid=22308 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2122/cgroup.controllers" dev="sda1" ino=16309 res=1 errno=0 05:19:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@prinfo={0x14}], 0x14}, 0x0) 05:19:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) r3 = dup2(r1, r0) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x15, &(0x7f0000001080)={r5}, &(0x7f00000010c0)=0x8) 05:19:37 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001000)=[{0x0}], 0x1, &(0x7f0000001040)}, 0x2) 05:19:37 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[{0x38, 0x0, 0x0, "07cc044d2a9df4794749fb25c623dd7343af70e22e8ddfc247c88aefa1c6431c3dcba48ba5fbce46c8"}, {0x68, 0x0, 0x0, "002589f439787ba53a886b10456c5d0f30d9532b3577202dff5c36515f8a0c0c0f7b56d99aa8b95b2a9c244c50b9989ca5ed87fb31dc0c66cabb70818a27f4f4c4ed0ffe6cb44e55560bf8249d8d3995bb741f874abd833678"}], 0xa0}, 0x0) 05:19:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 05:19:37 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x104, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:19:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040), 0x80) 05:19:38 executing program 5: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000100)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x8, 0x0, 0x7f, 0xfffffc00}) 05:19:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0xe22}, 0x10) 05:19:38 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001000)=[{0x0}], 0x1, &(0x7f0000001040)}, 0x0) [ 1186.544028][ T34] audit: type=1804 audit(1605158378.078:467): pid=22335 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2123/cgroup.controllers" dev="sda1" ino=16377 res=1 errno=0 05:19:38 executing program 0: setitimer(0x1, &(0x7f0000000500), 0x0) 05:19:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='r', 0x1}], 0x1, &(0x7f0000000080)=[@init={0x14, 0x84, 0x1, {0x0, 0x7}}], 0x14}, 0x0) 05:19:38 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 05:19:38 executing program 1: sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@abs={0x8}, 0x8) 05:19:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000480)=[{0x0}], 0x1, &(0x7f0000000540)=[@prinfo={0x14, 0x84, 0x7, {0x2}}, @init={0x14}, @sndrcv={0x2c}, @dstaddrv4={0x10}, @authinfo={0x10}], 0x74}, 0x2010d) 05:19:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, &(0x7f0000000000)="f7", 0x1, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 05:19:38 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 05:19:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='r', 0x1}], 0x1, &(0x7f0000000080)=[@init={0x14, 0x84, 0x1, {0x2}}], 0x14}, 0x0) 05:19:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000080)="15febae049e3276247d613806d64ea3195146a1af8b2f31daf6aec0ca24b9d73edd311f5a55d95e04c1778a80b16071673248ff344e37ee2657d1c4ef40c1fbc010362b25175a26d36d91a169a2a05b7ceb4d3833e63f8ebded98733", 0x5c}, {&(0x7f0000000100)='I', 0x1}], 0x2}, 0x0) 05:19:38 executing program 2: openat(0xffffffffffffffff, 0x0, 0x140580, 0x0) 05:19:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@prinfo={0x14, 0x84, 0x7, {0x2}}], 0x14}, 0x0) 05:19:38 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/191, 0xbf}, 0x40001) 05:19:38 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x80, 0x1c, 0x3}, 0x1c) [ 1186.873026][ T34] audit: type=1804 audit(1605158378.408:468): pid=22368 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2124/cgroup.controllers" dev="sda1" ino=16324 res=1 errno=0 05:19:38 executing program 1: execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='[)\x00', &(0x7f00000000c0)='$\x00'], &(0x7f0000000340)=[&(0x7f00000001c0)=']\x00', &(0x7f0000000200)='!\x00']) 05:19:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) 05:19:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040), 0xc) 05:19:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[{0xc}], 0xc}, 0x0) 05:19:38 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r4, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000000)={r6}, 0x8) 05:19:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000001500)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f00000000c0)="d2", 0x1}], 0x1, &(0x7f00000012c0)=[{0xc}], 0xc}, 0x0) 05:19:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='r', 0x1}], 0x1, &(0x7f0000000080)=[@prinfo={0x14, 0x84, 0x7, {0x1}}], 0x14}, 0x0) 05:19:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x1a, &(0x7f0000000140), 0x8) 05:19:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000480)={@multicast1, @multicast1, @multicast1}, 0xc) 05:19:38 executing program 2: setitimer(0x1, &(0x7f0000000500)={{0x0, 0x6ac}, {0x1400}}, 0x0) 05:19:38 executing program 4: setgroups(0x0, 0x0) setgroups(0x6, &(0x7f00000000c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0]) 05:19:38 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000040)={0x0, 0x0, 0x3}, 0x8) 05:19:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@prinfo={0x14, 0x84, 0x7, {0xf}}], 0x14}, 0x0) 05:19:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) connect$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 05:19:38 executing program 2: fcntl$lock(0xffffffffffffffff, 0xd, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 1187.357473][ T34] audit: type=1804 audit(1605158378.888:469): pid=22423 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2125/cgroup.controllers" dev="sda1" ino=16304 res=1 errno=0 05:19:39 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='r', 0x1}], 0x1, &(0x7f0000000080)=[@prinfo={0x14, 0x84, 0x7, {0x1}}, @init={0x14, 0x84, 0x1, {0x0, 0x7, 0x0, 0x101}}], 0x28}, 0x0) 05:19:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@authinfo={0x10}], 0x10}, 0x0) 05:19:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x6}, 0x10) 05:19:39 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000540)={@empty, @random="7771d1ec3447", @val, {@ipv6}}, 0x0) 05:19:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f00000001c0)=0x100, 0x4) 05:19:39 executing program 1: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 05:19:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='r', 0x1}], 0x1, &(0x7f0000000080)=[@prinfo={0x14}], 0x14}, 0x0) 05:19:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@sndinfo={0x1c}], 0x1c}, 0x0) 05:19:39 executing program 0: recvfrom(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0) 05:19:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@dstaddrv4={0x10}], 0x10}, 0x0) 05:19:39 executing program 4: execve(0x0, &(0x7f0000000180), &(0x7f0000000340)=[0x0]) 05:19:39 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@authinfo={0x10}], 0x10}, 0x0) 05:19:39 executing program 0: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}, 0x0) 05:19:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:19:39 executing program 4: clock_settime(0x0, &(0x7f0000000000)) pipe2(&(0x7f0000000040), 0x0) 05:19:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r4, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000000)={r6}, 0x8) 05:19:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) fcntl$lock(r0, 0x0, 0x0) 05:19:39 executing program 4: execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180), 0x0) 05:19:39 executing program 2: pipe2(0x0, 0x0) recvfrom(0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)=@un=@abs={0x8}, 0x8) 05:19:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)='I', 0x1}], 0x2}, 0x0) 05:19:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0xc) r5 = dup(r2) setsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x1, &(0x7f0000000140), 0x10) 05:19:39 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x40000000) 05:19:39 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c) 05:19:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000140)={0x0, 0x7}, 0x8) 05:19:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0xa0) 05:19:39 executing program 5: bind(0xffffffffffffffff, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 05:19:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000340)=ANY=[@ANYBLOB="1c1c4e230000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000087e000000000000000000000000000000000000000000000000000000000000000000000000092023ec94a"], &(0x7f0000000000)=0x98) 05:19:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@sndrcv={0x2c}], 0x2c}, 0x0) 05:19:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x8) 05:19:39 executing program 5: setitimer(0x0, &(0x7f0000000000), &(0x7f0000000040)) 05:19:39 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000240)='./file0\x00', 0x0) socket$inet_icmp(0x2, 0x2, 0x1) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 05:19:39 executing program 0: setgroups(0x4, &(0x7f0000000280)=[0x0, 0xffffffffffffffff, 0x0, 0x0]) 05:19:39 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x89, &(0x7f00000000c0)=@abs={0x8}, 0x8) 05:19:40 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:40 executing program 2: setitimer(0x0, &(0x7f0000000000)={{0x7fffffff}, {0x0, 0x8000}}, 0x0) 05:19:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)=0xa0) 05:19:40 executing program 4: fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x0, 0x2, 0x5, 0x1}) r0 = socket(0x1, 0x0, 0x8) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f00000001c0)=0xfffffffd, 0xfffffffffffffdd3) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x104, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_extract_tcp_res(&(0x7f00000000c0), 0xff, 0x80000001) 05:19:40 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) 05:19:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) connect$inet(r2, &(0x7f0000000140)={0x10, 0x2}, 0x10) 05:19:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000380), &(0x7f00000003c0)=0x8) 05:19:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x10) 05:19:40 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000540), &(0x7f0000000580)=0x8) 05:19:40 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) 05:19:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x29, &(0x7f0000000100), 0x8) 05:19:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) r3 = dup2(r1, r0) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0), &(0x7f0000001700)=0x4) 05:19:40 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[{0xc, 0x0, 0x3}], 0xc}, 0x0) 05:19:40 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 05:19:40 executing program 4: socket(0x2, 0x0, 0xfc) 05:19:40 executing program 5: connect(0xffffffffffffffff, &(0x7f0000000740)=@in={0x10, 0x2}, 0x10) 05:19:40 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt(r0, 0xffff, 0x8, &(0x7f0000000200)="802351df", 0x4) 05:19:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000001c0)=ANY=[], 0x8c) 05:19:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='r', 0x1}], 0x1, &(0x7f0000000080)=[@init={0x14, 0x84, 0x1, {0x0, 0x0, 0x0, 0x101}}], 0x14}, 0x0) 05:19:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 05:19:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@authinfo={0x10}], 0x10}, 0x0) 05:19:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) r1 = dup(r0) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000680)='l', 0x1}], 0x1}, 0x0) [ 1188.910812][ T34] kauditd_printk_skb: 4 callbacks suppressed [ 1188.910826][ T34] audit: type=1804 audit(1605158380.453:474): pid=22609 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2130/cgroup.controllers" dev="sda1" ino=16308 res=1 errno=0 05:19:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@sndrcv={0x2c}], 0x2c}, 0x0) 05:19:40 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x40003) 05:19:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), &(0x7f0000000180)=0x94) 05:19:40 executing program 1: fcntl$lock(0xffffffffffffffff, 0xc, &(0x7f0000000240)) 05:19:40 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000001580), &(0x7f00000015c0)=0x18) 05:19:40 executing program 0: setgroups(0x1e, 0x0) 05:19:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x9, 0x0, 0x6}, 0x10) 05:19:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000040), &(0x7f0000000080)=0x8) 05:19:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000040)="d7", 0x1}], 0x1}, 0x0) 05:19:40 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) socket(0x0, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c) 05:19:40 executing program 1: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x80) 05:19:40 executing program 2: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1}, 0x0) [ 1189.187717][ T34] audit: type=1804 audit(1605158380.723:475): pid=22639 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2131/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 05:19:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x8) 05:19:40 executing program 5: r0 = socket(0x1c, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 05:19:40 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:40 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) 05:19:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000080)=""/192, 0xc0, 0x120, 0x0, 0x0) 05:19:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x20, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 05:19:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100), 0x0, 0x8805, 0x0, 0x0) 05:19:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000001080)='6', 0x1, 0x20000840, &(0x7f0000001180)=@abs, 0x6e) 05:19:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0xc0) 05:19:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x2404c0c1, 0x0, 0x55) 05:19:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000340)=[{0x0, 0x0, 0x0}], 0x1, 0x4000) [ 1189.472158][ T34] audit: type=1804 audit(1605158381.013:476): pid=22681 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2132/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 05:19:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000001c0), 0x0, 0x28485e93c02ea9, 0x0, 0x0) 05:19:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000300)="b4", 0x1, 0x20004091, &(0x7f0000000200)=@abs, 0x6e) 05:19:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$P9_RREADDIR(r0, &(0x7f0000001200)=ANY=[], 0xe4) 05:19:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDFONTOP_GET(r0, 0x40045431, 0x0) 05:19:41 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) read$char_raw(r0, &(0x7f0000000000)=ANY=[], 0x2000) 05:19:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040)="a7", 0x1, 0x20008060, 0x0, 0x0) 05:19:41 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:41 executing program 1: 05:19:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)="97", 0x1, 0x28485e93c02ea9, 0x0, 0x4f) 05:19:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040), 0x0, 0x2400c804, &(0x7f0000000200)=@abs, 0x6e) 05:19:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)={0xa6, 0x29, 0x0, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0xa6) sendmmsg$unix(r0, &(0x7f0000000100), 0x49249249249267d, 0x0) 05:19:41 executing program 0: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000140), 0x2aaaaaaaaaaaaaac) 05:19:41 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000540)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000080)=':', 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x288}, 0x0) 05:19:41 executing program 5: 05:19:41 executing program 0: [ 1189.782995][ T34] audit: type=1804 audit(1605158381.323:477): pid=22712 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2133/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:41 executing program 5: 05:19:41 executing program 2: 05:19:41 executing program 0: 05:19:41 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:41 executing program 1: 05:19:41 executing program 4: 05:19:41 executing program 0: 05:19:41 executing program 5: 05:19:41 executing program 2: 05:19:41 executing program 1: 05:19:41 executing program 4: 05:19:41 executing program 0: 05:19:41 executing program 5: 05:19:41 executing program 2: 05:19:41 executing program 5: [ 1190.108517][ T34] audit: type=1804 audit(1605158381.643:478): pid=22733 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2134/cgroup.controllers" dev="sda1" ino=16301 res=1 errno=0 05:19:41 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:41 executing program 4: 05:19:41 executing program 2: 05:19:41 executing program 0: 05:19:41 executing program 1: 05:19:41 executing program 5: 05:19:41 executing program 4: 05:19:41 executing program 1: 05:19:41 executing program 5: 05:19:41 executing program 0: 05:19:41 executing program 2: 05:19:41 executing program 1: [ 1190.445578][ T34] audit: type=1804 audit(1605158381.983:479): pid=22751 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2135/cgroup.controllers" dev="sda1" ino=15770 res=1 errno=0 05:19:42 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:42 executing program 2: 05:19:42 executing program 5: 05:19:42 executing program 0: 05:19:42 executing program 4: 05:19:42 executing program 1: 05:19:42 executing program 0: 05:19:42 executing program 5: 05:19:42 executing program 2: 05:19:42 executing program 1: 05:19:42 executing program 4: 05:19:42 executing program 1: [ 1190.799588][ T34] audit: type=1804 audit(1605158382.333:480): pid=22769 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2136/cgroup.controllers" dev="sda1" ino=15764 res=1 errno=0 05:19:42 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:42 executing program 0: 05:19:42 executing program 2: 05:19:42 executing program 5: 05:19:42 executing program 4: 05:19:42 executing program 1: 05:19:42 executing program 0: 05:19:42 executing program 4: 05:19:42 executing program 2: 05:19:42 executing program 5: 05:19:42 executing program 1: 05:19:42 executing program 0: [ 1191.109220][ T34] audit: type=1804 audit(1605158382.643:481): pid=22789 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2137/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:42 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:42 executing program 4: 05:19:42 executing program 5: 05:19:42 executing program 1: 05:19:42 executing program 2: 05:19:42 executing program 0: 05:19:42 executing program 1: 05:19:42 executing program 2: 05:19:42 executing program 4: 05:19:42 executing program 5: 05:19:42 executing program 0: 05:19:43 executing program 2: [ 1191.499961][ T34] audit: type=1804 audit(1605158383.033:482): pid=22808 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2138/cgroup.controllers" dev="sda1" ino=16307 res=1 errno=0 05:19:43 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:43 executing program 1: 05:19:43 executing program 2: 05:19:43 executing program 0: 05:19:43 executing program 5: 05:19:43 executing program 4: 05:19:43 executing program 1: 05:19:43 executing program 2: 05:19:43 executing program 0: 05:19:43 executing program 5: 05:19:43 executing program 4: 05:19:43 executing program 0: [ 1191.804922][ T34] audit: type=1804 audit(1605158383.343:483): pid=22830 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2139/cgroup.controllers" dev="sda1" ino=16314 res=1 errno=0 05:19:43 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:43 executing program 1: 05:19:43 executing program 4: 05:19:43 executing program 2: 05:19:43 executing program 5: 05:19:43 executing program 0: 05:19:43 executing program 0: 05:19:43 executing program 2: 05:19:43 executing program 4: 05:19:43 executing program 1: 05:19:43 executing program 5: 05:19:43 executing program 2: 05:19:43 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:43 executing program 0: 05:19:43 executing program 4: 05:19:43 executing program 1: 05:19:43 executing program 5: 05:19:43 executing program 2: 05:19:43 executing program 1: 05:19:43 executing program 2: 05:19:43 executing program 5: 05:19:43 executing program 0: 05:19:43 executing program 4: 05:19:44 executing program 0: 05:19:44 executing program 4: 05:19:44 executing program 5: 05:19:44 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:44 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) dup2(r0, r1) 05:19:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 05:19:44 executing program 5: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) 05:19:44 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=ANY=[@ANYBLOB="6000000024000100"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000800010074626600340002"], 0x60}}, 0x0) 05:19:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) 05:19:44 executing program 1: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 05:19:44 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:44 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x48043, 0x0) read(r0, 0x0, 0x0) 05:19:44 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, 0x0) capset(&(0x7f0000000080)={0x20080522, r0}, 0x0) 05:19:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000c00ffbf, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() rt_tgsigqueueinfo(r0, r0, 0xf, &(0x7f0000000100)) clone(0x2102801df7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:19:44 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000540), &(0x7f0000000580)=0x4) 05:19:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7593, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:19:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) restart_syscall() 05:19:44 executing program 2: 05:19:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x401070c9, 0xffffffffffffffff) 05:19:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x45c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x430, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x39}}}, @TCA_TBF_PTAB={0x404}]}}]}, 0x45c}}, 0x0) 05:19:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setgroups(0x0, 0x0) 05:19:44 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000001c0)) 05:19:44 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000100)=[{{&(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0xe0}, @timestamp_prespec={0x44, 0x4}]}}}], 0x18}}], 0x1, 0x0) 05:19:44 executing program 2: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, 0x0, 0x0) 05:19:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1261, 0xffffffffffffffff) 05:19:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x9, 0x3, 0x1d0, 0x98, 0x0, 0xb0, 0x0, 0xb0, 0x138, 0x1a8, 0x1a8, 0x138, 0x1a8, 0x3, 0x0, {[{{@ip={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'virt_wifi0\x00', 'team0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x4}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x230) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x5c) sendmmsg$inet(r1, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}}], 0x4000172, 0x0) 05:19:45 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:45 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000180)='./bus\x00', 0x159042, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4000000000010046) 05:19:45 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000040), 0x0, r0}, 0x68) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000000)=""/55, &(0x7f0000000100)=0x37) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000040)='geneve1\x00') 05:19:45 executing program 4: mq_open(&(0x7f0000000000)='!\x00', 0xc0, 0x0, &(0x7f0000000080)={0x8, 0x3, 0x2e3fd3f0, 0xab}) 05:19:45 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0xee00, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 05:19:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="208ad9019612"}, 0x14) 05:19:45 executing program 0: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setuid(0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) accept$inet(r2, &(0x7f0000000640), &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0xc) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb01001f1}, 0x0) 05:19:45 executing program 2: semget(0x2, 0x0, 0x6f8) 05:19:45 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x2) 05:19:45 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1193.655400][T22958] x_tables: duplicate underflow at hook 3 [ 1193.688108][T22958] x_tables: duplicate underflow at hook 3 05:19:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_getscheduler(0x0) 05:19:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="74000000100001041000e41400ff7fcd2cc64fb3", @ANYRES32=r1, @ANYBLOB="00000000001f0c20540012801100010062725aad329d0000000076abf3a188023c0005"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 05:19:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0xd0, 0x0, 0xd0, 0xd0, 0xd0, 0x218, 0x228, 0x228, 0x218, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@ipv6={@mcast2, @loopback, [], [], 'wg0\x00', 'ip6gretap0\x00'}, 0x0, 0xe0, 0x148, 0x0, {}, [@common=@unspec=@owner={{0x38, 'owner\x00'}, {0xee01, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 05:19:45 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x145042, 0x0) r5 = memfd_create(&(0x7f0000000040)='iC;`\xb6p+\x10', 0x0) pwritev(r5, &(0x7f0000000200)=[{&(0x7f0000000140)="fb", 0x1}], 0x1, 0x81808, 0x0) sendfile(r4, r5, 0x0, 0x200000f) 05:19:45 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f00000000c0), 0x4) [ 1193.834752][T22983] xt_TCPMSS: Only works on TCP SYN packets [ 1193.845597][T22981] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. 05:19:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x82102, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x7ffff000) ioctl$TCSBRKP(r1, 0x5425, 0x0) 05:19:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 1193.895803][T22988] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1193.971817][T22997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1193.986537][T22998] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:19:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000035c0)=[{{&(0x7f0000000400)={0x2, 0x4e21, @empty}, 0x10, 0x0}}, {{&(0x7f0000000440)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001c40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffffd5}}], 0x18}}], 0x2, 0x0) 05:19:46 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:46 executing program 1: io_setup(0xffff, &(0x7f0000000340)) io_setup(0x101, &(0x7f0000000000)) 05:19:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) 05:19:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2000000001070500000000000000000000000000090001"], 0x20}}, 0x0) 05:19:46 executing program 5: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f00000000c0)=""/192) 05:19:46 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:46 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffd}]}) ioprio_set$pid(0x1, 0x0, 0x0) 05:19:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0) read(r0, &(0x7f0000000000)=""/4, 0xffffff13) 05:19:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff8000/0x3000)=nil, 0x4) 05:19:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) listen(r0, 0x0) 05:19:46 executing program 1: syz_emit_ethernet(0x46, &(0x7f0000000100)={@random="6b177dc8f798", @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x10, 0x3a, 0xff, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0xffff}}}}}}, 0x0) 05:19:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x159042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 05:19:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080)=0x8, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) accept$inet6(r3, 0x0, &(0x7f0000001640)) r4 = dup(r2) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r5}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2={0xfc, 0x2, [], 0x6}, 0x80000000}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x52000, 0x0) ioctl$BTRFS_IOC_START_SYNC(r7, 0x80089418, &(0x7f0000000580)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000640)={{}, r8, 0x6, @inherit={0x58, &(0x7f0000001680)=ANY=[@ANYBLOB="0100000000000000020000000000000002000000000000006a08000000000000050000000000000001000000010000002ffc00000003000000000000000400000000000000ddffffffffffff21f0aa99b3b0978acff26b8d40"]}, @name="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"}) ioctl$BTRFS_IOC_WAIT_SYNC(r6, 0x40089416, &(0x7f0000000200)=r8) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) ioctl$CHAR_RAW_ROGET(r4, 0x125e, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {0x0, 0x0, 0x1}}, {{@in6=@ipv4}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1}}, 0xe8) ioctl$BTRFS_IOC_FS_INFO(r6, 0x8400941f, &(0x7f00000002c0)) [ 1194.699746][ T34] kauditd_printk_skb: 1 callbacks suppressed [ 1194.699757][ T34] audit: type=1326 audit(1605158386.233:485): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23029 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0xffff0000 05:19:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r2 = dup(r0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x1, 0x3c}, 0x0, @in6=@private1, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 05:19:46 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:46 executing program 1: request_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0) 05:19:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) 05:19:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000001f40)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r1, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00') 05:19:46 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchownat(0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0) 05:19:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [0xb, 0x14, 0x8, 0x8, 0x2, 0x2, 0x7, 0xb, 0x4, 0xb, 0x3, 0x8, 0x8]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20c200a2, r3}) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x8, @private2={0xfc, 0x2, [], 0x6}, 0x80000000}, 0x1c) 05:19:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=@newtfilter={0x24, 0x2a, 0xd27}, 0x24}}, 0x0) 05:19:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x0, 0x7, 0x101, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x14, 0x3, 0x7, 0x5}, 0x14}}, 0x0) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001000088"], 0x0) 05:19:47 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:47 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='r', 0x1, 0xfffffffffffffffb) 05:19:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readahead(0xffffffffffffffff, 0x0, 0x0) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001000088"], 0x0) 05:19:47 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20008801) 05:19:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80) 05:19:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) close(r0) 05:19:47 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x400001e6, 0x0, 0x0) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001000088"], 0x0) 05:19:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000000)=""/231, &(0x7f0000000100)=0xffffffffffffff69) 05:19:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statfs(0x0, 0x0) 05:19:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) 05:19:47 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000049c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x0, 0xd0, 0x158, 0xd0, 0x290, 0x228, 0x228, 0x290, 0x228, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x118, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@hbh={{0x48, 'hbh\x00'}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "010345a94e6d17bdcb8a2a2089faea8bdbc6044a91a5f6f87533e7919f17"}}, {{@ipv6={@mcast2, @loopback, [], [], 'wg0\x00', 'ip6gretap0\x00'}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001000088"], 0x0) 05:19:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0) 05:19:47 executing program 1: syz_emit_ethernet(0x5f, &(0x7f0000000040)={@random="6b177dc8f798", @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x29, 0x3a, 0xff, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @private1, [{0x0, 0x2, "a53952db9fade77f9df63f5f723b72"}]}}}}}}, 0x0) 05:19:47 executing program 4: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000480)=0x80) [ 1195.941810][ T34] audit: type=1804 audit(1605158387.483:486): pid=23130 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2153/cgroup.controllers" dev="sda1" ino=16309 res=1 errno=0 05:19:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 05:19:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x45c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x430, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {0x9, 0x0, 0x0, 0x0, 0x0, 0x39}}}, @TCA_TBF_PTAB={0x404}]}}]}, 0x45c}}, 0x0) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, 0x0, 0x0) 05:19:47 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) 05:19:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'batadv_slave_1\x00', {0xffffffff}}) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, 0x0, 0x0) 05:19:47 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:47 executing program 2: msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2) 05:19:47 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) flistxattr(r0, &(0x7f00000002c0)=""/136, 0x88) 05:19:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 05:19:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:19:47 executing program 5: syz_emit_ethernet(0x4e, 0x0, 0x0) [ 1196.399692][ T34] audit: type=1804 audit(1605158387.933:487): pid=23190 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2154/cgroup.controllers" dev="sda1" ino=16304 res=1 errno=0 05:19:48 executing program 0: 05:19:48 executing program 2: 05:19:48 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[], 0x0) 05:19:48 executing program 4: 05:19:48 executing program 1: 05:19:48 executing program 0: 05:19:48 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:48 executing program 2: 05:19:48 executing program 1: 05:19:48 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[], 0x0) 05:19:48 executing program 4: 05:19:48 executing program 0: [ 1196.820888][ T34] audit: type=1804 audit(1605158388.363:488): pid=23222 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2155/cgroup.controllers" dev="sda1" ino=16300 res=1 errno=0 05:19:48 executing program 1: 05:19:48 executing program 4: 05:19:48 executing program 2: 05:19:48 executing program 0: 05:19:48 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[], 0x0) 05:19:48 executing program 2: 05:19:48 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:48 executing program 1: 05:19:48 executing program 4: 05:19:48 executing program 2: 05:19:48 executing program 0: 05:19:48 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) [ 1197.241466][ T34] audit: type=1804 audit(1605158388.783:489): pid=23246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2156/cgroup.controllers" dev="sda1" ino=15755 res=1 errno=0 05:19:48 executing program 4: 05:19:48 executing program 1: 05:19:48 executing program 2: 05:19:48 executing program 0: 05:19:48 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) 05:19:48 executing program 1: 05:19:49 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:49 executing program 0: 05:19:49 executing program 4: 05:19:49 executing program 2: 05:19:49 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) 05:19:49 executing program 1: [ 1197.656319][ T34] audit: type=1804 audit(1605158389.193:490): pid=23270 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2157/cgroup.controllers" dev="sda1" ino=15770 res=1 errno=0 05:19:49 executing program 1: 05:19:49 executing program 2: 05:19:49 executing program 4: 05:19:49 executing program 0: 05:19:49 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe80000000000000"], 0x0) 05:19:49 executing program 1: 05:19:49 executing program 0: 05:19:49 executing program 2: 05:19:49 executing program 4: 05:19:49 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe80000000000000"], 0x0) 05:19:49 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:49 executing program 1: [ 1198.047564][ T34] audit: type=1804 audit(1605158389.583:491): pid=23293 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2158/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:19:49 executing program 1: 05:19:49 executing program 2: 05:19:49 executing program 0: 05:19:49 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe80000000000000"], 0x0) 05:19:49 executing program 4: 05:19:49 executing program 0: 05:19:49 executing program 1: 05:19:49 executing program 2: 05:19:49 executing program 4: 05:19:49 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff"], 0x0) 05:19:49 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:49 executing program 0: 05:19:49 executing program 1: 05:19:49 executing program 2: 05:19:49 executing program 4: 05:19:49 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff"], 0x0) 05:19:50 executing program 0: 05:19:50 executing program 2: 05:19:50 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff"], 0x0) 05:19:50 executing program 1: 05:19:50 executing program 4: 05:19:50 executing program 0: 05:19:50 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:50 executing program 1: 05:19:50 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{}, {0x0, 0x1f}, {0x0, 0x8001}], 0x3, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x2, 0x1e82}], 0x1, 0x0) 05:19:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:50 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff00000000000000"], 0x0) 05:19:50 executing program 0: clock_gettime(0x3fd0eca6aa7d5cfc, 0x0) 05:19:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5607, 0x0) 05:19:50 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff00000000000000"], 0x0) 05:19:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b6a, 0x0) 05:19:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0x0, 0x0, 0xffff, 0x0, 0x0, "6cde7b7da3a2e01e"}) 05:19:50 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x8, 0x4) 05:19:50 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff00000000000000"], 0x0) 05:19:50 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b4a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) [ 1198.996636][ T34] audit: type=1804 audit(1605158390.533:492): pid=23374 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2162/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 05:19:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:51 executing program 0: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000001200)) 05:19:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b69, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:51 executing program 1: socketpair(0x28, 0x2, 0x0, &(0x7f00000002c0)) 05:19:51 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001"], 0x0) 05:19:51 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:51 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x1f}, {0x0, 0x0, 0x800}], 0x2, 0x0) 05:19:51 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1, &(0x7f0000000040)={0x0, 0x3938700}) 05:19:51 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001"], 0x0) 05:19:51 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$setownex(r0, 0xf, &(0x7f0000000600)={0x0, r2}) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) [ 1199.617681][T23390] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:19:51 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff0000000000000000000001"], 0x0) 05:19:51 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)) [ 1199.655806][ T34] audit: type=1804 audit(1605158391.193:493): pid=23387 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2163/cgroup.controllers" dev="sda1" ino=16308 res=1 errno=0 [ 1199.659726][T23390] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 [ 1199.778321][T23390] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1199.794544][T23390] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 05:19:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b48, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b4e, 0x0) 05:19:51 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff00000000000000000000010000"], 0x0) 05:19:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x541d, &(0x7f0000000040)={0x91, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) [ 1199.922152][T23421] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1199.945617][T23421] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 05:19:51 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r6], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b72, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:51 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000082800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x4001, 0x3, 0x300, 0x0, 0x0, 0x148, 0x0, 0x148, 0x268, 0x240, 0x240, 0x268, 0x240, 0x3, 0x0, {[{{@uncond, 0x0, 0x120, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x23, 0x0, 0x0, 0x800, 0x7}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'rose0\x00', {0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x80000000}}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0xb8, 0x118, 0x0, {}, [@common=@unspec=@nfacct={{0x48, 'nfacct\x00'}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x12) wait4(0x0, 0x0, 0x0, 0x0) 05:19:51 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff00000000000000000000010000"], 0x0) 05:19:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, 0x0, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)={0x1c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 05:19:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:51 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) 05:19:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:51 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd603b7eac00180000fe800000000000000000000000000000fc02000000f8ff00000000000000000000010000"], 0x0) [ 1200.130390][T23437] xt_nfacct: accounting object `syz1' does not exists [ 1200.131172][T23436] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1200.145703][T23436] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 05:19:51 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:51 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) 05:19:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5411, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) [ 1200.268443][ T34] audit: type=1804 audit(1605158391.803:494): pid=23442 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2164/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 [ 1200.398350][T23464] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1200.405777][T23464] BFS-fs: bfs_fill_super(): Inode 0x00000003 corrupted on loop2 05:19:52 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x80045440, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) [ 1200.670291][ T34] audit: type=1804 audit(1605158392.213:495): pid=23474 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2165/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:19:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b3b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:54 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:54 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) 05:19:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x4b61, &(0x7f0000000040)={0x91, 0x0, 0x0, 0x0, 0x0, "6e29063e505c9b24148a86a1e1e1b81fd2f464"}) 05:19:54 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x7462d17d32f7bd9d) 05:19:54 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:54 executing program 5: 05:19:54 executing program 0: 05:19:54 executing program 1: 05:19:54 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:54 executing program 5: 05:19:54 executing program 1: [ 1203.222342][ T34] audit: type=1804 audit(1605158394.764:496): pid=23486 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2166/cgroup.controllers" dev="sda1" ino=16304 res=1 errno=0 05:19:54 executing program 4: 05:19:54 executing program 5: 05:19:54 executing program 0: 05:19:54 executing program 1: 05:19:54 executing program 2: syz_mount_image$bfs(0x0, &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:55 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:55 executing program 4: 05:19:55 executing program 0: 05:19:55 executing program 5: 05:19:55 executing program 1: 05:19:55 executing program 0: 05:19:55 executing program 4: 05:19:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', 0x0, 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:55 executing program 5: 05:19:55 executing program 4: 05:19:55 executing program 0: 05:19:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', 0x0, 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1203.670130][ T34] audit: type=1804 audit(1605158395.214:497): pid=23520 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2167/cgroup.controllers" dev="sda1" ino=16315 res=1 errno=0 05:19:55 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:55 executing program 1: 05:19:55 executing program 5: 05:19:55 executing program 4: 05:19:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', 0x0, 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:55 executing program 0: 05:19:55 executing program 0: 05:19:55 executing program 1: 05:19:55 executing program 5: 05:19:55 executing program 0: 05:19:55 executing program 4: 05:19:55 executing program 0: [ 1203.933605][ T34] audit: type=1804 audit(1605158395.474:498): pid=23554 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2168/cgroup.controllers" dev="sda1" ino=16377 res=1 errno=0 05:19:55 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:55 executing program 1: 05:19:55 executing program 4: 05:19:55 executing program 5: 05:19:55 executing program 0: 05:19:55 executing program 1: 05:19:55 executing program 4: 05:19:55 executing program 0: [ 1204.081602][T23563] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1204.088865][T23563] BFS-fs: bfs_fill_super(): Last block not available on loop2: 63 05:19:55 executing program 5: 05:19:55 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:55 executing program 0: [ 1204.219963][ T34] audit: type=1804 audit(1605158395.764:499): pid=23570 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2169/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 [ 1204.309391][T23576] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1204.318286][T23576] BFS-fs: bfs_fill_super(): Last block not available on loop2: 63 05:19:56 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:56 executing program 5: 05:19:56 executing program 1: 05:19:56 executing program 4: 05:19:56 executing program 0: 05:19:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:56 executing program 5: 05:19:56 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = open(&(0x7f0000000180)='./bus\x00', 0x40002, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000001}) 05:19:56 executing program 4: setresuid(0x0, 0xee00, 0xee01) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x10, 0x0, 0x0) 05:19:56 executing program 1: pipe(&(0x7f00000000c0)) mlock(&(0x7f0000ff9000/0x1000)=nil, 0x1000) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ff4000/0x1000)=nil, 0x1000) munlock(&(0x7f0000fec000/0x14000)=nil, 0x14000) [ 1204.595780][T23589] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:19:56 executing program 5: io_setup(0x7, &(0x7f0000000080)=0x0) io_getevents(r0, 0xc0fc, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}) [ 1204.640705][T23589] BFS-fs: bfs_fill_super(): Last block not available on loop2: 63 05:19:56 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001180)='/dev/nvram\x00', 0x0, 0x0) dup2(r1, r0) [ 1204.737881][ T34] audit: type=1804 audit(1605158396.274:500): pid=23597 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2170/cgroup.controllers" dev="sda1" ino=16298 res=1 errno=0 05:19:56 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:56 executing program 1: pipe(&(0x7f00000000c0)) mlock(&(0x7f0000ff9000/0x1000)=nil, 0x1000) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ff4000/0x1000)=nil, 0x1000) munlock(&(0x7f0000fec000/0x14000)=nil, 0x14000) 05:19:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/204) 05:19:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) 05:19:56 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x40042408, 0x0) 05:19:56 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000100)=""/4096, 0x1000}, {0x0}, {&(0x7f00000011c0)=""/188, 0xbc}], 0x3}, 0x0) sendmmsg$alg(r0, &(0x7f0000000240), 0x4c, 0x0) 05:19:56 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bsg\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x0) 05:19:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) 05:19:56 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40284504, &(0x7f0000000000)) 05:19:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000007b40)={0x0, 0x0, &(0x7f0000007b00)={&(0x7f0000007ac0)={0x2, 0x3, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:19:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 05:19:56 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40044591, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) [ 1205.209829][ T34] audit: type=1804 audit(1605158396.754:501): pid=23626 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2171/cgroup.controllers" dev="sda1" ino=16298 res=1 errno=0 05:19:56 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:56 executing program 0: r0 = socket$inet(0x2, 0x3, 0x40) sendmmsg$unix(r0, &(0x7f0000013440)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000001480)=[{&(0x7f0000000300)="11", 0x1}, {0x0}, {&(0x7f0000000280)="ca", 0x1}], 0x3, &(0x7f0000001680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x40}], 0x1, 0x0) 05:19:56 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 05:19:56 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x34}]}) 05:19:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000240)=""/4096) 05:19:56 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) 05:19:56 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000100)=""/181) 05:19:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x400445a0, &(0x7f0000000000)) 05:19:57 executing program 1: openat$cgroup_procs(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0) 05:19:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:57 executing program 4: clone(0x4000091005d7d, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f0000001140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0xb, 0x0) preadv(r2, &(0x7f0000000500), 0x37d, 0x0, 0x0) 05:19:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80084504, 0x0) [ 1205.522547][ T34] audit: type=1804 audit(1605158397.064:502): pid=23654 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2172/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 [ 1205.556820][T23664] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:19:57 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:57 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, 0x0, &(0x7f0000000040)) 05:19:57 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000000)=0xfff, 0x4) 05:19:57 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2405, 0x3) 05:19:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x40) sendmmsg$unix(r0, &(0x7f0000013440)=[{&(0x7f0000000140)=@abs, 0x6e, 0x0}], 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 05:19:57 executing program 1: kexec_load(0x9, 0x1, &(0x7f0000002600)=[{0x0}], 0x1) [ 1205.753890][T23683] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:19:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:57 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2405, 0x3) [ 1205.838552][ T34] audit: type=1804 audit(1605158397.374:503): pid=23684 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2173/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 05:19:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x0, 0xfffff000}]}) [ 1205.906872][T23697] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1205.943986][ T34] audit: type=1326 audit(1605158397.484:504): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=23699 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0xffff0000 05:19:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x16, 0x0, 0x0) 05:19:57 executing program 1: r0 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)='/dev/loop#\x00') 05:19:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f0000000000)) 05:19:57 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {0x0, 0x0, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:57 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:19:57 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:19:57 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2405, 0x0) 05:19:57 executing program 4: setresuid(0x0, 0xee00, 0xee01) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000025c0), 0x4) 05:19:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1206.383341][T23724] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1206.428548][ T34] audit: type=1804 audit(1605158397.964:505): pid=23722 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2174/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 05:19:58 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {0x0, 0x0, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:58 executing program 5: setresuid(0x0, 0xee00, 0xee01) socket$inet(0x2, 0x3, 0x9a) 05:19:58 executing program 5: 05:19:58 executing program 4: 05:19:58 executing program 1: 05:19:58 executing program 5: [ 1206.565566][T23737] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:19:58 executing program 5: [ 1206.629527][ T4886] usb 1-1: new low-speed USB device number 89 using dummy_hcd [ 1207.009560][ T4886] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1207.019548][ T4886] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1207.028711][ T4886] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1207.041174][ T4886] usb 1-1: config 0 descriptor?? [ 1207.070865][T23717] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1207.091458][ T4886] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input16 05:20:00 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:00 executing program 4: 05:20:00 executing program 1: 05:20:00 executing program 5: 05:20:00 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {0x0, 0x0, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:00 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1209.361330][ T4886] usb 1-1: USB disconnect, device number 89 05:20:00 executing program 5: 05:20:01 executing program 1: 05:20:01 executing program 4: [ 1209.431529][T23781] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:01 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240), 0x0, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:01 executing program 4: 05:20:01 executing program 1: [ 1209.548076][ T34] audit: type=1804 audit(1605158401.074:506): pid=23782 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2175/cgroup.controllers" dev="sda1" ino=16276 res=1 errno=0 [ 1209.636110][T23796] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1209.829309][ T4886] usb 1-1: new low-speed USB device number 90 using dummy_hcd [ 1210.189331][ T4886] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1210.199499][ T4886] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1210.208579][ T4886] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1210.221461][ T4886] usb 1-1: config 0 descriptor?? [ 1210.240018][T23783] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1210.262716][ T4886] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input17 05:20:03 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:03 executing program 5: 05:20:03 executing program 1: 05:20:03 executing program 4: 05:20:03 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240), 0x0, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:03 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1212.419411][T10708] usb 1-1: USB disconnect, device number 90 05:20:04 executing program 4: 05:20:04 executing program 1: 05:20:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {0x0, 0x0, r2, 0x10}}, 0xa0) [ 1212.499276][T23837] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:04 executing program 1: r0 = socket(0x1e, 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) 05:20:04 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240), 0x0, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1212.556177][ T34] audit: type=1804 audit(1605158404.084:507): pid=23835 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2176/cgroup.controllers" dev="sda1" ino=16301 res=1 errno=0 05:20:04 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r1, 0x3312, 0x101) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1212.672170][T23851] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1212.859138][T10708] usb 1-1: new low-speed USB device number 91 using dummy_hcd [ 1213.229441][T10708] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1213.240779][T10708] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1213.249844][T10708] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1213.263621][T10708] usb 1-1: config 0 descriptor?? [ 1213.299915][T23836] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1213.331344][T10708] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input18 05:20:07 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:07 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:07 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r0, 0x80984120, &(0x7f0000000200)) 05:20:07 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c34", 0x23, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:07 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x28}, 0x0) 05:20:07 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1215.470901][ T43] usb 1-1: USB disconnect, device number 91 05:20:07 executing program 5: syz_open_dev$dri(&(0x7f0000000500)='/dev/dri/card#\x00', 0x0, 0x81) [ 1215.558720][T23896] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1215.586421][ T34] audit: type=1804 audit(1605158407.114:508): pid=23893 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2177/cgroup.controllers" dev="sda1" ino=16304 res=1 errno=0 05:20:07 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x0, 0x101}}, 0x10) 05:20:07 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$rds(r0, &(0x7f00000008c0)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) 05:20:07 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c34", 0x23, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:07 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 05:20:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 1215.790193][T23917] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1215.918962][ T43] usb 1-1: new low-speed USB device number 92 using dummy_hcd [ 1216.288977][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1216.298968][ T43] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1216.307974][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1216.321243][ T43] usb 1-1: config 0 descriptor?? [ 1216.343063][T23894] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1216.360834][ T43] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input19 05:20:10 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) 05:20:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:10 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:10 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:10 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:10 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c34", 0x23, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1218.520256][ T43] usb 1-1: USB disconnect, device number 92 [ 1218.585390][T23957] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1218.638250][ T34] audit: type=1804 audit(1605158410.165:509): pid=23955 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2178/cgroup.controllers" dev="sda1" ino=16311 res=1 errno=0 05:20:10 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:10 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2", 0x34, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:10 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:10 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1218.812138][T23976] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1219.029122][ T43] usb 1-1: new low-speed USB device number 93 using dummy_hcd [ 1219.078423][ T34] audit: type=1804 audit(1605158410.605:510): pid=23997 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2179/cgroup.controllers" dev="sda1" ino=16299 res=1 errno=0 [ 1219.428823][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1219.438780][ T43] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1219.447882][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1219.468133][ T43] usb 1-1: config 0 descriptor?? [ 1219.489688][T23964] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1219.510760][ T43] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input20 05:20:13 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) 05:20:13 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2", 0x34, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:13 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:13 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:13 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}}, 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1221.588836][T10708] usb 1-1: USB disconnect, device number 93 [ 1221.661723][T24035] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1221.736088][ T34] audit: type=1804 audit(1605158413.265:511): pid=24030 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2180/cgroup.controllers" dev="sda1" ino=16214 res=1 errno=0 05:20:13 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2", 0x34, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:13 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}}, 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:13 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8", 0x3d, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1221.929436][T24051] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1222.019238][T10708] usb 1-1: new low-speed USB device number 94 using dummy_hcd [ 1222.030870][T24066] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1222.031796][ T34] audit: type=1804 audit(1605158413.565:512): pid=24065 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2181/cgroup.controllers" dev="sda1" ino=16149 res=1 errno=0 [ 1222.398691][T10708] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1222.418604][T10708] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1222.427630][T10708] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1222.459023][T10708] usb 1-1: config 0 descriptor?? [ 1222.479291][T24037] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1222.500834][T10708] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input21 05:20:16 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x800, 0x0) 05:20:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:16 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8", 0x3d, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:16 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}}, 0x14}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1224.648685][T10708] usb 1-1: USB disconnect, device number 94 [ 1224.705503][T24110] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:16 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8", 0x3d, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) [ 1224.783648][ T34] audit: type=1804 audit(1605158416.315:513): pid=24109 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2182/cgroup.controllers" dev="sda1" ino=16378 res=1 errno=0 05:20:16 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1224.921799][T24128] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:16 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09f", 0x41, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1225.089858][T10708] usb 1-1: new low-speed USB device number 95 using dummy_hcd [ 1225.103518][T24149] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1225.448766][T10708] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1225.468457][T10708] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1225.468469][T10708] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1225.469165][T10708] usb 1-1: config 0 descriptor?? [ 1225.519299][T24115] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1225.540390][T10708] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input22 05:20:19 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000140)) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:19 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:19 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09f", 0x41, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:19 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1227.729116][T23944] usb 1-1: USB disconnect, device number 95 05:20:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1227.839441][T24191] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:19 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1227.870795][ T34] audit: type=1804 audit(1605158419.405:514): pid=24185 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2183/cgroup.controllers" dev="sda1" ino=16377 res=1 errno=0 05:20:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:19 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09f", 0x41, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) [ 1228.198248][T23944] usb 1-1: new low-speed USB device number 96 using dummy_hcd [ 1228.235091][T24218] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1228.560293][T23944] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1228.571699][T23944] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1228.618329][T23944] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1228.643558][T23944] usb 1-1: config 0 descriptor?? [ 1228.678978][T24192] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1228.700291][T23944] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input23 [ 1228.915902][T10708] usb 1-1: USB disconnect, device number 96 05:20:20 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000140)) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:20 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r1) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:20 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:20 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff562", 0x43, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r0) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:21 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff562", 0x43, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1229.470972][T24267] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r1) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 1229.630215][ T34] audit: type=1804 audit(1605158421.165:515): pid=24285 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2184/cgroup.controllers" dev="sda1" ino=16303 res=1 errno=0 [ 1229.660185][T24286] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:21 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r5], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:21 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff562", 0x43, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1229.848127][ T43] usb 1-1: new low-speed USB device number 97 using dummy_hcd [ 1229.882916][T24304] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1229.942446][ T34] audit: type=1804 audit(1605158421.475:516): pid=24299 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2185/cgroup.controllers" dev="sda1" ino=16378 res=1 errno=0 [ 1230.228491][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1230.247112][ T43] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1230.272828][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1230.302120][ T43] usb 1-1: config 0 descriptor?? [ 1230.319131][T24279] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1230.340530][ T43] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input24 [ 1230.540570][T10708] usb 1-1: USB disconnect, device number 97 05:20:22 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000140)) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:22 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r1) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:22 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff56239", 0x44, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:22 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1231.136042][T24348] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing 05:20:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 1231.179012][ T34] audit: type=1804 audit(1605158422.715:517): pid=24342 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2186/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:20:22 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:22 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff56239", 0x44, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:22 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:23 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff56239", 0x44, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1231.396236][T24371] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1231.420316][ T43] usb 1-1: new low-speed USB device number 98 using dummy_hcd [ 1231.506196][ T34] audit: type=1804 audit(1605158423.035:518): pid=24374 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2187/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 [ 1231.528978][T24382] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1231.778058][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1231.795963][ T43] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1231.833966][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1231.848840][ T43] usb 1-1: config 0 descriptor?? [ 1231.888751][T24352] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1231.910061][ T43] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input25 [ 1232.128405][T10708] usb 1-1: USB disconnect, device number 98 05:20:24 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:24 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:24 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:24 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1232.674948][T24415] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000002) 05:20:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:24 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1232.806290][ T34] audit: type=1804 audit(1605158424.335:519): pid=24421 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2188/cgroup.controllers" dev="sda1" ino=16308 res=1 errno=0 05:20:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:24 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:24 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1232.982417][T24439] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000002) [ 1233.007982][ T17] usb 1-1: new low-speed USB device number 99 using dummy_hcd [ 1233.368317][ T17] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1233.378285][ T17] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1233.387292][ T17] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1233.403584][ T17] usb 1-1: config 0 descriptor?? [ 1233.428828][T24425] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1233.449997][ T17] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input26 [ 1233.650691][ T17] usb 1-1: USB disconnect, device number 99 05:20:25 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:25 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:25 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:25 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:25 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1234.214542][T24489] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000002) 05:20:25 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:25 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:25 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1234.339460][ T34] audit: type=1804 audit(1605158425.876:520): pid=24502 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2189/cgroup.controllers" dev="sda1" ino=16304 res=1 errno=0 05:20:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:26 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1234.468920][T24507] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 05:20:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:26 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1234.527915][ T9783] usb 1-1: new low-speed USB device number 100 using dummy_hcd 05:20:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1234.652646][T24529] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1234.726603][ T34] audit: type=1804 audit(1605158426.256:521): pid=24534 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2190/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 [ 1234.958116][ T9783] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1234.972457][ T9783] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1234.994175][ T9783] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1235.008295][ T9783] usb 1-1: config 0 descriptor?? [ 1235.038741][T24498] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1235.049841][ T9783] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input27 [ 1235.262913][ T17] usb 1-1: USB disconnect, device number 100 05:20:27 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:27 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:27 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:27 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) [ 1235.837090][T24576] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1235.883576][ T34] audit: type=1804 audit(1605158427.416:522): pid=24574 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2191/cgroup.controllers" dev="sda1" ino=16310 res=1 errno=0 05:20:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:27 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:27 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:27 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1236.137748][ T43] usb 1-1: new low-speed USB device number 101 using dummy_hcd [ 1236.167438][T24606] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1236.499664][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1236.509649][ T43] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1236.530752][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1236.545591][ T43] usb 1-1: config 0 descriptor?? [ 1236.578670][T24582] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1236.599929][ T43] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input28 [ 1236.815170][ T9783] usb 1-1: USB disconnect, device number 101 05:20:28 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:28 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={0x0, 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:28 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:28 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:28 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:28 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1237.449795][ T34] audit: type=1804 audit(1605158428.986:523): pid=24659 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2192/cgroup.controllers" dev="sda1" ino=16308 res=1 errno=0 05:20:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) [ 1237.491088][T24647] FAT-fs (loop5): bogus number of reserved sectors [ 1237.497712][T24650] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1237.506104][T24647] FAT-fs (loop5): Can't find a valid FAT filesystem 05:20:29 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1237.677674][ T43] usb 1-1: new low-speed USB device number 102 using dummy_hcd 05:20:29 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:29 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={0x0, 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1237.815808][T24679] FAT-fs (loop5): bogus number of reserved sectors [ 1237.822467][T24679] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1237.905269][T24681] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1237.943833][ T34] audit: type=1804 audit(1605158429.476:524): pid=24683 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2193/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 [ 1238.047980][ T43] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1238.067808][ T43] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1238.077062][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1238.093567][ T43] usb 1-1: config 0 descriptor?? [ 1238.128536][T24654] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1238.149801][ T43] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input29 [ 1238.365769][ T43] usb 1-1: USB disconnect, device number 102 [ 1238.377651][ C1] usb_acecad 1-1:0.0: can't resubmit intr, dummy_hcd.0-1/input0, status -19 05:20:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:30 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:30 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:30 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={0x0, 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1239.020833][ T34] audit: type=1804 audit(1605158430.556:525): pid=24720 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2194/cgroup.controllers" dev="sda1" ino=16307 res=1 errno=0 [ 1239.026819][T24723] FAT-fs (loop5): bogus number of reserved sectors [ 1239.054336][T24721] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 05:20:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 1239.073187][T24723] FAT-fs (loop5): Can't find a valid FAT filesystem 05:20:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', 0x0, 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:30 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1239.227549][T10708] usb 1-1: new low-speed USB device number 103 using dummy_hcd 05:20:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:31 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200001b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce0000000000000004368ee3006d7268d42630f05b177657a9e80f334d6c37d03057bbecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc0090b4700e3ebfd7a03005333000171d94768e25826d8162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474ff3f640e3d4905000000000000005768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98abfb194d4429449cd85af76d9929b318c98dbe984f51eede1ead2f9921120246508b2ab804b38f1ca0000cd661d21ab5d7a8b9f974bb91fe5f266fee4e594da366ec0aee3344d712d35000000f279c9bc5ab33161e78d0ec42c37b99156c3471399e06005f05f37888d0b0968f5a8fcdf57cc5c00005f083aea4f07d3c3ad8d7f6502d3a64d034ec7cbae33eb45ce0f5660cf1ed7be1d180d26f938df6f6b9a4cf77ce3590ca82c5af802aded561102fa23b41a7e428718263d4de4462348571190c36b89eb95c03d4f51636a53c1536f13911624eb5835c86351ee23d183f614cb0c1dcaaa808e407f30744744eb62421f578f07e0ef6caf7bc56e455a971418975caded8acf7c900161b62ebab94b938d4b1b946cb23604273c71dc4ff366d0ec53c29cc1c6c083a421b6d3555ab6837d21ed3a4ff7dc254f557648e052ad1e6a5bcbff4eee48be25eb3b342e82bb63996d3cb3b320c4247e4044b3858f7c5dcf2c36d88f36167eba7c8b850fd61d4bafedb6ab0a3ef1bbc79a632cf772e6abba898ee822a054bcd4d216e268b4b78899af000000019857d2742898720b7cdd00000000000000000000000000000000166306b91f9998c95f924ac4cccbf4d5555e467a4fbf6e422137123b67a921de24d57e3ff7967bd0a645fd66dc63c60bd4cde93e9aa79fbbb45e44ba2e90d726046ccd0fd7dd9db3a3fa25428d512d4f399b2a465bbb3523f21e57bae1691703e48c0ffdcc876d4ddd733507c70871eaf7ae113cb448982d390af4a3e3e43730707c4a9f7d005092b25d8fea122bcabef0ed5ce5ee94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00"], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) [ 1239.418137][T24754] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 05:20:31 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1239.487752][T24760] FAT-fs (loop1): bogus number of reserved sectors [ 1239.500532][T24760] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1239.521469][T24771] FAT-fs (loop4): bogus number of reserved sectors [ 1239.528121][T24771] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1239.599804][T10708] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 1239.613226][ T34] audit: type=1804 audit(1605158431.156:526): pid=24768 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2195/cgroup.controllers" dev="sda1" ino=16298 res=1 errno=0 [ 1239.616256][T10708] usb 1-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=1a.c8 [ 1239.655010][T10708] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1239.676983][T10708] usb 1-1: config 0 descriptor?? [ 1239.708381][T24726] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1239.719794][T24776] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 1239.729617][T10708] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input30 [ 1239.969124][T10708] usb 1-1: USB disconnect, device number 103 05:20:32 executing program 0: syz_usb_connect(0x1, 0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000899b3f0860040800c81a0000000109021b000100000000090400000187e1410009058202aa"], 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x800, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) 05:20:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x0) 05:20:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) 05:20:32 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 05:20:32 executing program 2: syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)="cefaad1b00", 0x5}, {&(0x7f0000000240)="0200000007000000080000001f0e00000281ceb5c5814e40c2a6614aedb97690e91c340f8a0df642ef903eb0014f31e9f22db3f2bd0c5a7d2faf3e2ad8addea09ff5623993", 0x45, 0x200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:20:32 executing program 3: pipe(&(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x60}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00"], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x10000fff9) 05:20:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000880)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000001c0)={[{@utf8='utf8=1'}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) [ 1240.510336][T24803] FAT-fs (loop5): bogus number of reserved sectors [ 1240.517834][T24803] FAT-fs (loop5): Can't find a valid FAT filesystem [ 1240.527070][T24807] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 1240.536156][T24807] BFS-fs: bfs_fill_super(): Superblock is corrupted on loop2 [ 1240.608170][ T34] audit: type=1804 audit(1605158432.146:527): pid=24810 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir521223906/syzkaller.rJ1m6b/2196/cgroup.controllers" dev="sda1" ino=16304 res=1 errno=0 [ 1240.635858][T24811] FAT-fs (loop1): bogus number of reserved sectors [ 1240.644031][T24811] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1240.668854][T24821] ================================================================== [ 1240.676961][T24821] BUG: KCSAN: data-race in lookup_fast / retain_dentry [ 1240.683793][T24821] [ 1240.686119][T24821] write to 0xffff888028d39000 of 4 bytes by task 24809 on cpu 1: [ 1240.693829][T24821] retain_dentry+0x1c3/0x240 [ 1240.698415][T24821] dput+0x10e/0x420 [ 1240.702237][T24821] filename_create+0x138/0x3c0 [ 1240.706989][T24821] do_mkdirat+0x5a/0x220 [ 1240.711219][T24821] __x64_sys_mkdir+0x32/0x40 [ 1240.715805][T24821] do_syscall_64+0x39/0x80 [ 1240.720220][T24821] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1240.726088][T24821] [ 1240.728407][T24821] read to 0xffff888028d39000 of 4 bytes by task 24821 on cpu 0: [ 1240.736144][T24821] lookup_fast+0x15f/0x370 [ 1240.740551][T24821] walk_component+0x5c/0x350 [ 1240.745130][T24821] path_lookupat+0x11d/0x550 [ 1240.749717][T24821] filename_lookup+0xf2/0x380 [ 1240.754390][T24821] user_path_at_empty+0x3b/0x50 [ 1240.759267][T24821] __se_sys_mount+0x209/0x2e0 [ 1240.763934][T24821] __x64_sys_mount+0x63/0x70 [ 1240.768522][T24821] do_syscall_64+0x39/0x80 [ 1240.772930][T24821] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1240.778799][T24821] [ 1240.781111][T24821] Reported by Kernel Concurrency Sanitizer on: [ 1240.787257][T24821] CPU: 0 PID: 24821 Comm: syz-executor.4 Not tainted 5.10.0-rc3-syzkaller #0 [ 1240.795999][T24821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.806046][T24821] ================================================================== [ 1240.814094][T24821] Kernel panic - not syncing: panic_on_warn set ... [ 1240.820667][T24821] CPU: 0 PID: 24821 Comm: syz-executor.4 Not tainted 5.10.0-rc3-syzkaller #0 [ 1240.829406][T24821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1240.839451][T24821] Call Trace: [ 1240.842735][T24821] dump_stack+0x116/0x15d [ 1240.847041][T24821] panic+0x1e7/0x5fa [ 1240.850925][T24821] ? vprintk_emit+0x2f2/0x370 [ 1240.855599][T24821] kcsan_report+0x67b/0x680 [ 1240.860081][T24821] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 1240.865608][T24821] ? lookup_fast+0x15f/0x370 [ 1240.870176][T24821] ? walk_component+0x5c/0x350 [ 1240.874915][T24821] ? path_lookupat+0x11d/0x550 [ 1240.879650][T24821] ? filename_lookup+0xf2/0x380 [ 1240.884493][T24821] ? user_path_at_empty+0x3b/0x50 [ 1240.889495][T24821] ? __se_sys_mount+0x209/0x2e0 [ 1240.894327][T24821] ? __x64_sys_mount+0x63/0x70 [ 1240.899081][T24821] ? do_syscall_64+0x39/0x80 [ 1240.903652][T24821] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1240.909723][T24821] ? ext4_handle_dirty_dirblock+0x184/0x330 [ 1240.915609][T24821] kcsan_setup_watchpoint+0x46a/0x4d0 [ 1240.920966][T24821] lookup_fast+0x15f/0x370 [ 1240.925381][T24821] walk_component+0x5c/0x350 [ 1240.929953][T24821] path_lookupat+0x11d/0x550 [ 1240.934519][T24821] filename_lookup+0xf2/0x380 [ 1240.939179][T24821] ? __virt_addr_valid+0x15a/0x1a0 [ 1240.944269][T24821] ? strncpy_from_user+0x147/0x230 [ 1240.949365][T24821] user_path_at_empty+0x3b/0x50 [ 1240.954200][T24821] __se_sys_mount+0x209/0x2e0 [ 1240.958849][T24821] ? mntput+0x45/0x70 [ 1240.962813][T24821] ? __fpregs_load_activate+0x103/0x1f0 [ 1240.968344][T24821] __x64_sys_mount+0x63/0x70 [ 1240.972912][T24821] do_syscall_64+0x39/0x80 [ 1240.977300][T24821] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1240.983165][T24821] RIP: 0033:0x46090a [ 1240.987036][T24821] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1241.006624][T24821] RSP: 002b:00007f5a78024a88 EFLAGS: 00000216 ORIG_RAX: 00000000000000a5 [ 1241.015015][T24821] RAX: ffffffffffffffda RBX: 00007f5a78024b20 RCX: 000000000046090a [ 1241.022985][T24821] RDX: 0000000020000540 RSI: 0000000020000580 RDI: 0000000000000000 [ 1241.030943][T24821] RBP: 00007f5a78024ae0 R08: 00007f5a78024b20 R09: 0000000020000540 [ 1241.038903][T24821] R10: 0000000000240038 R11: 0000000000000216 R12: 0000000020000540 [ 1241.046855][T24821] R13: 0000000020000580 R14: 0000000000000000 R15: 0000000020001ec0 [ 1241.055687][T24821] Kernel Offset: disabled [ 1241.060047][T24821] Rebooting in 86400 seconds..