[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. 2020/03/27 00:38:35 fuzzer started syzkaller login: [ 43.643522][ T7154] ld (7154) used greatest stack depth: 24760 bytes left 2020/03/27 00:38:37 dialing manager at 10.128.0.26:33655 2020/03/27 00:38:38 syscalls: 3028 2020/03/27 00:38:38 code coverage: enabled 2020/03/27 00:38:38 comparison tracing: enabled 2020/03/27 00:38:38 extra coverage: enabled 2020/03/27 00:38:38 setuid sandbox: enabled 2020/03/27 00:38:38 namespace sandbox: enabled 2020/03/27 00:38:38 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/27 00:38:38 fault injection: enabled 2020/03/27 00:38:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/27 00:38:38 net packet injection: enabled 2020/03/27 00:38:38 net device setup: enabled 2020/03/27 00:38:38 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/27 00:38:38 devlink PCI setup: PCI device 0000:00:10.0 is not available 00:40:05 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4840, 0x0) [ 131.702771][ T7168] IPVS: ftp: loaded support on port[0] = 21 00:40:05 executing program 1: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000100), 0x4) [ 131.825845][ T7168] chnl_net:caif_netlink_parms(): no params data found [ 131.930385][ T7168] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.948006][ T7168] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.973638][ T7168] device bridge_slave_0 entered promiscuous mode [ 131.982561][ T7168] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.003050][ T7168] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.010658][ T7168] device bridge_slave_1 entered promiscuous mode [ 132.029434][ T7298] IPVS: ftp: loaded support on port[0] = 21 [ 132.054138][ T7168] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.078134][ T7168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.126290][ T7168] team0: Port device team_slave_0 added [ 132.160951][ T7168] team0: Port device team_slave_1 added 00:40:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='cpuset\x00') syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_open_dev$vbi(0x0, 0x0, 0x2) sendfile(r1, r0, 0x0, 0x2) [ 132.181441][ T7168] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 132.189364][ T7168] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 132.217576][ T7168] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 132.244442][ T7168] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 132.251431][ T7168] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 132.279161][ T7168] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 132.294930][ T7298] chnl_net:caif_netlink_parms(): no params data found [ 132.355792][ T7168] device hsr_slave_0 entered promiscuous mode [ 132.373444][ T7168] device hsr_slave_1 entered promiscuous mode [ 132.446183][ T7434] IPVS: ftp: loaded support on port[0] = 21 00:40:06 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x66, &(0x7f0000000440)={r3, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000180)=0x100) [ 132.647943][ T7298] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.657454][ T7298] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.684437][ T7298] device bridge_slave_0 entered promiscuous mode [ 132.724924][ T7298] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.732285][ T7298] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.754157][ T7298] device bridge_slave_1 entered promiscuous mode [ 132.814582][ T7525] IPVS: ftp: loaded support on port[0] = 21 [ 132.818311][ T7168] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 132.885247][ T7298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.908573][ T7168] netdevsim netdevsim0 netdevsim1: renamed from eth1 00:40:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000180)=0x9c) [ 132.951424][ T7298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.995294][ T7168] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 133.035552][ T7168] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 133.067945][ T7434] chnl_net:caif_netlink_parms(): no params data found [ 133.133851][ T7298] team0: Port device team_slave_0 added [ 133.167009][ T7298] team0: Port device team_slave_1 added 00:40:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 133.386313][ T7298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 133.390574][ T7655] IPVS: ftp: loaded support on port[0] = 21 [ 133.399636][ T7725] IPVS: ftp: loaded support on port[0] = 21 [ 133.406496][ T7298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 133.437995][ T7298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 133.449385][ T7434] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.457049][ T7434] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.465057][ T7434] device bridge_slave_0 entered promiscuous mode [ 133.477313][ T7434] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.484543][ T7434] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.492271][ T7434] device bridge_slave_1 entered promiscuous mode [ 133.511140][ T7298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 133.518721][ T7298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 133.545572][ T7298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 133.559245][ T7525] chnl_net:caif_netlink_parms(): no params data found [ 133.588782][ T7434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.630420][ T7434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.728281][ T7298] device hsr_slave_0 entered promiscuous mode [ 133.773296][ T7298] device hsr_slave_1 entered promiscuous mode [ 133.812950][ T7298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 133.821036][ T7298] Cannot create hsr debugfs directory [ 133.840591][ T7434] team0: Port device team_slave_0 added [ 133.852580][ T7434] team0: Port device team_slave_1 added [ 133.874478][ T7525] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.881602][ T7525] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.890418][ T7525] device bridge_slave_0 entered promiscuous mode [ 133.902018][ T7525] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.910042][ T7525] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.919199][ T7525] device bridge_slave_1 entered promiscuous mode [ 133.937000][ T7434] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 133.944060][ T7434] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 133.971871][ T7434] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 133.998825][ T7168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.031403][ T7434] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 134.039614][ T7434] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 134.068352][ T7434] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 134.135206][ T7434] device hsr_slave_0 entered promiscuous mode [ 134.173028][ T7434] device hsr_slave_1 entered promiscuous mode [ 134.202736][ T7434] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 134.210321][ T7434] Cannot create hsr debugfs directory [ 134.222024][ T7525] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.239461][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.249464][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.260919][ T7168] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.288495][ T7525] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.317117][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.326090][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.336599][ T2793] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.343950][ T2793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.369978][ T7525] team0: Port device team_slave_0 added [ 134.381286][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.390795][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.400124][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.409061][ T2793] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.416204][ T2793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.435766][ T7525] team0: Port device team_slave_1 added [ 134.446605][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.550099][ T7525] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 134.557253][ T7525] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 134.586746][ T7525] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 134.601507][ T7525] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 134.609709][ T7525] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 134.636928][ T7525] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 134.648636][ T7725] chnl_net:caif_netlink_parms(): no params data found [ 134.685470][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.742736][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.751574][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.761264][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.770612][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.781759][ T7655] chnl_net:caif_netlink_parms(): no params data found [ 134.835922][ T7525] device hsr_slave_0 entered promiscuous mode [ 134.892916][ T7525] device hsr_slave_1 entered promiscuous mode [ 134.942778][ T7525] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 134.950585][ T7525] Cannot create hsr debugfs directory [ 134.962114][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.970477][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.979040][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.035702][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.049849][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.101642][ T7725] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.117007][ T7725] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.127382][ T7725] device bridge_slave_0 entered promiscuous mode [ 135.136197][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.154738][ T7434] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 135.211454][ T7434] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 135.256434][ T7725] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.264098][ T7725] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.271720][ T7725] device bridge_slave_1 entered promiscuous mode [ 135.301901][ T7434] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 135.339115][ T7655] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.347286][ T7655] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.355845][ T7655] device bridge_slave_0 entered promiscuous mode [ 135.369397][ T7655] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.377042][ T7655] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.388314][ T7655] device bridge_slave_1 entered promiscuous mode [ 135.395748][ T7298] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 135.466540][ T7434] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 135.528046][ T7725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.552189][ T7298] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 135.586694][ T7298] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 135.644583][ T7298] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 135.686013][ T7725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.711493][ T7655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 135.740238][ T7725] team0: Port device team_slave_0 added [ 135.753133][ T7655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 135.766037][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 135.774036][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 135.787066][ T7168] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.800277][ T7725] team0: Port device team_slave_1 added [ 135.865143][ T7655] team0: Port device team_slave_0 added [ 135.877413][ T7655] team0: Port device team_slave_1 added [ 135.892489][ T7725] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 135.899485][ T7725] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 135.926514][ T7725] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 135.939709][ T7725] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 135.946825][ T7725] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 135.973369][ T7725] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 135.994865][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 136.003807][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.068690][ T7655] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 136.078844][ T7655] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.107729][ T7655] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 136.124859][ T7168] device veth0_vlan entered promiscuous mode [ 136.133364][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.142081][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.158936][ T7434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 136.195924][ T7725] device hsr_slave_0 entered promiscuous mode [ 136.222735][ T7725] device hsr_slave_1 entered promiscuous mode [ 136.272954][ T7725] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 136.280625][ T7725] Cannot create hsr debugfs directory [ 136.304007][ T7655] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 136.311101][ T7655] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.338195][ T7655] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 136.353103][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.361112][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.435341][ T7655] device hsr_slave_0 entered promiscuous mode [ 136.465412][ T7655] device hsr_slave_1 entered promiscuous mode [ 136.532420][ T7655] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 136.539994][ T7655] Cannot create hsr debugfs directory [ 136.555821][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.563973][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.590620][ T7168] device veth1_vlan entered promiscuous mode [ 136.607984][ T7434] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.615831][ T7525] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 136.690334][ T7525] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 136.776152][ T7525] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 136.814409][ T7525] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 136.882419][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 136.890591][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 136.901394][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.910751][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.919634][ T2810] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.926816][ T2810] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.935179][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.944026][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.952829][ T2810] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.959887][ T2810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.967652][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.007146][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.016085][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.028110][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.039155][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.066098][ T7298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.077267][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.102686][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.115176][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.123733][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.131988][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.140834][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.149445][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.176896][ T7434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.203111][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 137.211915][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.231774][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.239966][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.264659][ T7725] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 137.328057][ T7725] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 137.398578][ T7168] device veth0_macvtap entered promiscuous mode [ 137.408881][ T7298] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.419602][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 137.428357][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 137.436842][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 137.446854][ T7434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.458130][ T7725] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 137.506822][ T7725] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 137.597734][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.606607][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.617974][ T2820] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.625112][ T2820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.636001][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.645122][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.653862][ T2820] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.660967][ T2820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.669225][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.678018][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.687887][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.704081][ T7168] device veth1_macvtap entered promiscuous mode [ 137.711162][ T7655] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 137.760125][ T7525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.783771][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.791689][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 137.800973][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.810601][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.820172][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.828987][ T7655] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 137.875485][ T7655] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 137.939966][ T7655] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 137.997285][ T7168] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 138.005320][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.014266][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.023076][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.031356][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.040294][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.048845][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.057746][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.071570][ T7525] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.087693][ T7298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.099803][ T7298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.116096][ T7168] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 138.126923][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.135086][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.144285][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.153206][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.161513][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.170465][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.205190][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.216002][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.225280][ T2820] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.232409][ T2820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.266651][ T7434] device veth0_vlan entered promiscuous mode [ 138.329235][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.337454][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.346662][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.356784][ T2970] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.363901][ T2970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.371922][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.381194][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.389796][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.398181][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 138.405917][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 138.414104][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.424907][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.432943][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.453790][ T7298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.468093][ T7434] device veth1_vlan entered promiscuous mode [ 138.615108][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 138.624335][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.633124][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.641621][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 138.650775][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 138.659676][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.669463][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.691767][ T7525] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 00:40:12 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4840, 0x0) [ 138.707439][ T7525] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 138.752759][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 138.761846][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.770588][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.781056][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.790848][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 00:40:12 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4840, 0x0) [ 138.799940][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.834065][ T7725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.864196][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:40:12 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4840, 0x0) [ 138.879148][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.889486][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.903874][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 138.911383][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 138.925101][ T7298] device veth0_vlan entered promiscuous mode 00:40:13 executing program 0: openat$rfkill(0xffffffffffffff9c, 0x0, 0x4840, 0x0) [ 138.940715][ T7725] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.969277][ T7525] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 138.978306][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.987258][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 00:40:13 executing program 0: openat$rfkill(0xffffffffffffff9c, 0x0, 0x4840, 0x0) 00:40:13 executing program 0: openat$rfkill(0xffffffffffffff9c, 0x0, 0x4840, 0x0) [ 139.012663][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.020475][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.047898][ T7298] device veth1_vlan entered promiscuous mode 00:40:13 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) [ 139.086155][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 139.099686][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.112971][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.121381][ T2820] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.128607][ T2820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.175648][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.186932][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.212861][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.236689][ T7655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.247318][ T7434] device veth0_macvtap entered promiscuous mode [ 139.268184][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 139.284805][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.298722][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.307356][ T2827] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.314479][ T2827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.347278][ T7434] device veth1_macvtap entered promiscuous mode [ 139.363887][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.373431][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.386546][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.395300][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.405169][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.414096][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.421743][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.431040][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.440537][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.450959][ T7655] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.470382][ T7298] device veth0_macvtap entered promiscuous mode [ 139.481677][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.490517][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.499505][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.508795][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.517515][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.526765][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.535770][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 139.548615][ T7434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 139.559923][ T7434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.573988][ T7434] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 139.584013][ T7298] device veth1_macvtap entered promiscuous mode [ 139.610740][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.618806][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.627957][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.637674][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.646783][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.655121][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.664387][ T2820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.672960][ T2820] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.680025][ T2820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.689746][ T7434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 139.701611][ T7434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.714296][ T7434] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 139.736608][ T7525] device veth0_vlan entered promiscuous mode [ 139.746387][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.759059][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.768081][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.776865][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.786608][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.795249][ T2827] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.802389][ T2827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.809922][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.818831][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 139.829048][ T2827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.844117][ T7725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.860449][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 139.874627][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.885068][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 139.896031][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.908209][ T7298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 139.920358][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 139.931502][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.942365][ T7298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 139.953625][ T7298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 139.965048][ T7298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 140.005037][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.014378][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.022371][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.030805][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.039644][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.048434][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.057307][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.066231][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.075251][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.088618][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.097018][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.105881][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.158393][ T7525] device veth1_vlan entered promiscuous mode [ 140.219504][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.232359][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.240682][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.254534][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.304134][ T7655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.378807][ T7725] 8021q: adding VLAN 0 to HW filter on device batadv0 00:40:14 executing program 1: 00:40:14 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) [ 140.434735][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 140.447745][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 140.472322][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.507576][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.531925][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 140.554919][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 140.576862][ T7525] device veth0_macvtap entered promiscuous mode [ 140.608939][ T7655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.621596][ T7525] device veth1_macvtap entered promiscuous mode [ 140.658208][ T7525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 140.669416][ T7525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 140.688327][ T7525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 140.707921][ T7525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 140.720889][ T7525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 140.732647][ T7525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 140.759607][ T7525] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 140.772051][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 140.780094][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.796988][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.809883][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.822742][ T7525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 140.833618][ T7525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 140.845445][ T7525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 140.856789][ T7525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 140.867723][ T7525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 140.878634][ T7525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 140.890443][ T7525] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 140.905700][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.915284][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.939295][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.950451][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.103326][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 141.117437][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.143024][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 00:40:15 executing program 3: [ 141.159057][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.167093][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 141.184316][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.200456][ T7725] device veth0_vlan entered promiscuous mode [ 141.239435][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 141.249486][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.268586][ T7655] device veth0_vlan entered promiscuous mode [ 141.281479][ T7725] device veth1_vlan entered promiscuous mode [ 141.296951][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.308441][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.343325][ T7655] device veth1_vlan entered promiscuous mode [ 141.350464][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 141.360233][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.370148][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.388082][ T7725] device veth0_macvtap entered promiscuous mode [ 141.404728][ T7725] device veth1_macvtap entered promiscuous mode [ 141.431300][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 141.440165][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 141.448935][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.457425][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.466513][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.482995][ T7655] device veth0_macvtap entered promiscuous mode [ 141.497251][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.508615][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.518589][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.529142][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.539104][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.549582][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.559735][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.570661][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.584221][ T7725] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 141.593644][ T7655] device veth1_macvtap entered promiscuous mode [ 141.605791][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 141.614429][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.623080][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.631540][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.642720][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.653544][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.664682][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.675236][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.685123][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.696503][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.706667][ T7725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.717199][ T7725] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.728442][ T7725] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 141.742532][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 141.751043][ T2793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.779771][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.791094][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.801042][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.813454][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.824725][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.835541][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.845483][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.855978][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.865871][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 141.876404][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.887879][ T7655] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 141.925168][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.933951][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.945158][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.955947][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.966182][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.977146][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.987950][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 141.998544][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.008487][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 142.018989][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.028911][ T7655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 142.040609][ T7655] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.056513][ T7655] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 142.114424][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.125175][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.298445][ T8488] Dev loop0: unable to read RDB block 1 [ 142.307269][ T8488] loop0: unable to read partition table [ 142.315948][ T8488] loop0: partition table beyond EOD, truncated [ 142.349885][ T8488] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:16 executing program 4: 00:40:16 executing program 2: 00:40:16 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 00:40:16 executing program 1: 00:40:16 executing program 3: 00:40:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:16 executing program 3: 00:40:16 executing program 2: 00:40:16 executing program 1: 00:40:16 executing program 0: 00:40:16 executing program 4: [ 142.628850][ T8507] Dev loop0: unable to read RDB block 1 [ 142.650708][ T8507] loop0: unable to read partition table [ 142.657674][ T8507] loop0: partition table beyond EOD, truncated [ 142.691819][ T8507] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:16 executing program 2: 00:40:16 executing program 3: 00:40:16 executing program 1: 00:40:16 executing program 0: 00:40:16 executing program 4: 00:40:16 executing program 1: 00:40:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:16 executing program 1: 00:40:16 executing program 3: 00:40:16 executing program 0: 00:40:16 executing program 4: 00:40:16 executing program 2: 00:40:17 executing program 1: 00:40:17 executing program 3: 00:40:17 executing program 4: 00:40:17 executing program 2: 00:40:17 executing program 1: 00:40:17 executing program 0: [ 143.035106][ T8530] Dev loop0: unable to read RDB block 1 [ 143.046367][ T8530] loop0: unable to read partition table [ 143.070409][ T8530] loop0: partition table beyond EOD, truncated [ 143.097627][ T8530] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:17 executing program 3: 00:40:17 executing program 2: 00:40:17 executing program 4: 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 4: 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 2: 00:40:17 executing program 3: 00:40:17 executing program 4: [ 143.329738][ T8554] Dev loop0: unable to read RDB block 1 [ 143.336078][ T8554] loop0: unable to read partition table [ 143.366749][ T8554] loop0: partition table beyond EOD, truncated [ 143.395249][ T8554] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 4: 00:40:17 executing program 3: 00:40:17 executing program 2: 00:40:17 executing program 4: 00:40:17 executing program 3: 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 2: 00:40:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:17 executing program 4: 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 3: 00:40:17 executing program 2: 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:17 executing program 4: 00:40:17 executing program 3: 00:40:17 executing program 2: 00:40:17 executing program 0: 00:40:17 executing program 1: 00:40:17 executing program 2: 00:40:17 executing program 4: 00:40:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:18 executing program 3: 00:40:18 executing program 1: 00:40:18 executing program 2: 00:40:18 executing program 4: 00:40:18 executing program 0: 00:40:18 executing program 1: 00:40:18 executing program 2: 00:40:18 executing program 3: 00:40:18 executing program 4: 00:40:18 executing program 0: 00:40:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:18 executing program 3: 00:40:18 executing program 1: 00:40:18 executing program 4: 00:40:18 executing program 0: 00:40:18 executing program 2: 00:40:18 executing program 4: 00:40:18 executing program 1: 00:40:18 executing program 2: 00:40:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:18 executing program 0: 00:40:18 executing program 3: 00:40:18 executing program 3: 00:40:18 executing program 1: 00:40:18 executing program 4: 00:40:18 executing program 2: 00:40:18 executing program 0: 00:40:18 executing program 3: 00:40:18 executing program 1: 00:40:18 executing program 0: 00:40:18 executing program 4: 00:40:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:18 executing program 2: 00:40:18 executing program 3: 00:40:18 executing program 1: 00:40:18 executing program 2: 00:40:18 executing program 0: 00:40:18 executing program 3: 00:40:18 executing program 4: 00:40:18 executing program 1: 00:40:18 executing program 1: 00:40:18 executing program 3: [ 144.816197][ T8655] Dev loop0: unable to read RDB block 1 [ 144.827114][ T8655] loop0: unable to read partition table [ 144.849644][ T8655] loop0: partition table beyond EOD, truncated 00:40:18 executing program 2: [ 144.894697][ T8655] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:19 executing program 4: 00:40:19 executing program 0: 00:40:19 executing program 2: 00:40:19 executing program 1: 00:40:19 executing program 3: 00:40:19 executing program 2: 00:40:19 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 00:40:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000017c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, 0x0, 0x32}, 0x20) 00:40:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="020000000000000002000000e00b02025d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000fb7bc8014fdfb622dcc000"/155], 0x90) 00:40:19 executing program 1: [ 145.160538][ T8678] Dev loop0: unable to read RDB block 1 [ 145.174783][ T8678] loop0: unable to read partition table [ 145.214964][ T8678] loop0: partition table beyond EOD, truncated [ 145.247737][ T8678] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:19 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 00:40:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:19 executing program 2: 00:40:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:19 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0xdd5d) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[@ANYRESHEX], 0x12) splice(r0, 0x0, r3, 0x0, 0x20010003, 0x0) 00:40:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:19 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) 00:40:19 executing program 4: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 00:40:19 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0x5b4, 0x0, &(0x7f00000001c0), 0x10) [ 145.471427][ T8711] Dev loop0: unable to read RDB block 1 [ 145.479388][ T8711] loop0: unable to read partition table [ 145.504996][ T8711] loop0: partition table beyond EOD, truncated [ 145.559353][ T8711] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:19 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0xdd5d) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[@ANYRESHEX], 0x12) splice(r0, 0x0, r3, 0x0, 0x20010003, 0x0) 00:40:19 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x2}, 0x30) 00:40:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:19 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:40:19 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 145.868925][ T8743] Dev loop0: unable to read RDB block 1 [ 145.878848][ T8743] loop0: unable to read partition table [ 145.894372][ T8743] loop0: partition table beyond EOD, truncated [ 145.904349][ T8743] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) [ 146.079271][ C1] hrtimer: interrupt took 44722 ns 00:40:20 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) 00:40:20 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:20 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1}, 0x10162) 00:40:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 146.108778][ T27] audit: type=1800 audit(1585269620.143:2): pid=8762 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15796 res=0 [ 146.162463][ T27] audit: type=1800 audit(1585269620.203:3): pid=8770 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15796 res=0 00:40:20 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:20 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x20, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x1c}}, 0x0) [ 146.232604][ T8771] Dev loop0: unable to read RDB block 1 [ 146.243461][ T8771] loop0: unable to read partition table 00:40:20 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 146.309044][ T8771] loop0: partition table beyond EOD, truncated 00:40:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 146.371986][ T8771] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:20 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) [ 146.458066][ T27] audit: type=1800 audit(1585269620.493:4): pid=8791 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15778 res=0 00:40:20 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) 00:40:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:20 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1=0xe0000002}}}, 0x90) 00:40:20 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8943, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @local}}) 00:40:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r2, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/109, 0x6d}, {&(0x7f0000000600)=""/196, 0xc4}, {&(0x7f0000000340)=""/53, 0x35}], 0x3, 0x0) 00:40:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x7fffffff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1f, 0x0, "b5d9fc2a00"}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0xffffffb5, 0x0, 0x0, 0x0, 0x0, "81003df1b94381701500000000022800"}) 00:40:20 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) [ 146.802872][ T8817] Dev loop0: unable to read RDB block 1 [ 146.812069][ T8817] loop0: unable to read partition table [ 146.860991][ T8817] loop0: partition table beyond EOD, truncated [ 146.885867][ T8817] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:20 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f00000001c0), 0x10) [ 146.910889][ T4251] Dev loop0: unable to read RDB block 1 00:40:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 146.933414][ T4251] loop0: unable to read partition table [ 146.958545][ T4251] loop0: partition table beyond EOD, truncated 00:40:21 executing program 3: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x10f, 0x0, 0x0, &(0x7f0000000100)) 00:40:21 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1}}}, 0x90) 00:40:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000013c0)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r2, @ANYBLOB="000200080000000004001680100001800c10040008000081000000000800040000000000"], 0x3c}}, 0x0) 00:40:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) 00:40:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:40:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 147.198076][ T8848] Dev loop0: unable to read RDB block 1 [ 147.209729][ T8848] loop0: unable to read partition table [ 147.219610][ T8848] loop0: partition table beyond EOD, truncated 00:40:21 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1}}}, 0x90) 00:40:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000013c0)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r2, @ANYBLOB="00020008000000001c001680100001800c10040008000081000000000800040000000000"], 0x3c}}, 0x0) 00:40:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 147.311791][ T8848] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:40:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 147.611391][ T8884] Dev loop0: unable to read RDB block 1 [ 147.619703][ T8884] loop0: unable to read partition table [ 147.631849][ T8860] syz-executor.2 (8860) used greatest stack depth: 24448 bytes left [ 147.643568][ T8884] loop0: partition table beyond EOD, truncated [ 147.659181][ T8884] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) [ 147.711898][ T8871] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 00:40:21 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$int_in(r2, 0x5421, &(0x7f0000000040)=0xdd5d) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) splice(r0, 0x0, r3, 0x0, 0x20010003, 0x0) 00:40:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:40:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:21 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1, &(0x7f0000000640)=""/179, 0xb3}}], 0x1, 0x10002, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 147.846107][ T8899] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 147.933231][ T8903] Dev loop0: unable to read RDB block 1 [ 147.963829][ T27] audit: type=1800 audit(1585269622.003:5): pid=8912 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15769 res=0 00:40:22 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000001c0)={0x2b, 0x5, 0x0, {0x0, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) 00:40:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:40:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 147.972492][ T8903] loop0: unable to read partition table 00:40:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 00:40:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x4) [ 148.027653][ T8903] loop0: partition table beyond EOD, truncated 00:40:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) [ 148.080700][ T8903] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8002, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x1008) sendfile(r0, r1, 0x0, 0x200fff) 00:40:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:22 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x2e0, 0xe8, 0x2e0, 0x1f8, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) 00:40:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 00:40:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_EXPIRES={0x8}]}, 0x24}}, 0x0) [ 148.692588][ T27] audit: type=1800 audit(1585269622.733:6): pid=8913 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15769 res=0 00:40:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x0, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:22 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 148.785861][ T27] audit: type=1800 audit(1585269622.823:7): pid=8953 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15831 res=0 00:40:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:22 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 00:40:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:22 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 148.872500][ T27] audit: type=1800 audit(1585269622.833:8): pid=8953 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15831 res=0 00:40:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x0, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) 00:40:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 148.971699][ T27] audit: type=1800 audit(1585269623.003:9): pid=8972 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15834 res=0 00:40:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 149.045385][ T414] tipc: Subscription rejected, illegal request 00:40:23 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) setsockopt$inet_int(r2, 0x0, 0x22, &(0x7f0000000040), 0x4) 00:40:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x1e, 0x0, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x44}}, 0x0) [ 149.090054][ T27] audit: type=1800 audit(1585269623.033:10): pid=8976 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15778 res=0 00:40:23 executing program 5: r0 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 149.197422][ T27] audit: type=1800 audit(1585269623.143:11): pid=8967 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15778 res=0 00:40:23 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x30}}, 0x0) 00:40:23 executing program 4: r0 = socket(0x1e, 0x1, 0x0) recvmsg$can_raw(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000380)=""/40, 0x28}], 0x1}, 0x0) 00:40:23 executing program 5: r0 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x30}}, 0x0) 00:40:24 executing program 4: unshare(0x20000) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:24 executing program 5: r0 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:24 executing program 2: r0 = socket$inet6(0x10, 0x80000000003, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="5500000018007f7000fe01b2a4a280930a60fc00fca84308910000003900090020000c00030000000d000500fe0000323ad5570800c78b8008231408000b9d1100b5df1d9033009284e7b1df136ef75a0000000000", 0x55}], 0x1}, 0x0) 00:40:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:24 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x1e, 0x1, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x30}}, 0x0) 00:40:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:24 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fcntl$setownex(r3, 0xf, &(0x7f0000704000)={0x2, r2}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r4, 0x0) 00:40:24 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 150.308128][ T414] tipc: Subscription rejected, illegal request 00:40:24 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4400, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') setxattr$security_evm(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0xffffffffffffff38, 0x0) [ 150.495310][ T21] tipc: Subscription rejected, illegal request 00:40:24 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x8140, 0x0) 00:40:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x1e, 0x1, 0x0, 0x0, {}, [@FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}}, 0x0) 00:40:24 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:24 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2d, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1=0xe0000002}}}, 0x90) 00:40:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 00:40:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 00:40:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x1e, 0x1, 0x0, 0x0, {}, [@FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}}, 0x0) 00:40:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:25 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 00:40:25 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:25 executing program 2: [ 150.980792][ T414] tipc: Subscription rejected, illegal request 00:40:25 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) 00:40:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@ipv6_newrule={0x30, 0x1e, 0x1, 0x0, 0x0, {}, [@FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}}, 0x0) 00:40:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x20}, [@RTA_PREF={0x5}]}, 0x24}}, 0x0) 00:40:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:25 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:25 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 00:40:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746b5e66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) dup2(r1, r2) 00:40:25 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x5, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x1008) sendfile(r0, r2, 0x0, 0x200fff) [ 151.225904][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 151.225912][ T27] audit: type=1800 audit(1585269625.263:16): pid=9118 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15767 res=0 00:40:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:25 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0xdd5d) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[@ANYRESHEX], 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r3, 0x0, 0x20010003, 0x0) 00:40:25 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:25 executing program 2: mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 151.379344][ T27] audit: type=1800 audit(1585269625.413:17): pid=9136 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15814 res=0 [ 151.449844][ T27] audit: type=1800 audit(1585269625.483:18): pid=9128 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15814 res=0 00:40:25 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) 00:40:25 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x4d, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:40:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000017c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1}]}]}}, 0x0, 0x32}, 0x20) 00:40:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 151.968281][ T27] audit: type=1326 audit(1585269626.004:19): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x50000 [ 152.001046][ T9157] Dev loop0: unable to read RDB block 1 [ 152.007108][ T9157] loop0: unable to read partition table 00:40:26 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 152.017782][ T9157] loop0: partition table beyond EOD, truncated [ 152.025997][ T27] audit: type=1326 audit(1585269626.034:20): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 00:40:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:26 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 152.057814][ T9157] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:26 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x2e0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x8000000, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) [ 152.089746][ T27] audit: type=1326 audit(1585269626.034:21): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 152.110152][ T27] audit: type=1326 audit(1585269626.034:22): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 152.141093][ T27] audit: type=1326 audit(1585269626.034:23): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 00:40:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:26 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 152.191599][ T27] audit: type=1326 audit(1585269626.034:24): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 152.220009][ T27] audit: type=1326 audit(1585269626.034:25): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9152 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 152.311363][ T9181] Dev loop0: unable to read RDB block 1 [ 152.319601][ T9181] loop0: unable to read partition table [ 152.370588][ T9181] loop0: partition table beyond EOD, truncated [ 152.376793][ T9181] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:26 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) 00:40:26 executing program 0: r0 = socket$inet6(0x10, 0x80000000003, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="5500000018007f7000fe01b2a4a280930a600000fca8430891000000390009000b000c00030000000d000500fe0000323ad5570800c78b8008231408000b9d1100b5df1d9033009284e7b1df136ef75a0000000000", 0x55}], 0x1}, 0x0) 00:40:26 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:26 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x2, 0x20}}, 0x1c}}, 0x0) [ 152.832663][ T9203] IPv6: NLM_F_CREATE should be specified when creating new route [ 152.895116][ T9205] Dev loop0: unable to read RDB block 1 [ 152.906447][ T9205] loop0: unable to read partition table [ 152.917627][ T9205] loop0: partition table beyond EOD, truncated [ 152.936123][ T9205] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:27 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:27 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 153.232270][ T9231] Dev loop0: unable to read RDB block 1 [ 153.238283][ T9231] loop0: unable to read partition table [ 153.244243][ T9231] loop0: partition table beyond EOD, truncated [ 153.250918][ T9231] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:27 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) sendfile(r0, r2, 0x0, 0x200fff) 00:40:27 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:27 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:27 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 153.801354][ T9254] Dev loop0: unable to read RDB block 1 [ 153.821398][ T9254] loop0: unable to read partition table 00:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:27 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 153.858466][ T9254] loop0: partition table beyond EOD, truncated [ 153.885504][ T9254] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:28 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:28 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 154.141941][ T9282] Dev loop0: unable to read RDB block 1 [ 154.147555][ T9282] loop0: unable to read partition table [ 154.168466][ T9282] loop0: partition table beyond EOD, truncated [ 154.176167][ T9282] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:28 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) sendfile(r0, r2, 0x0, 0x200fff) 00:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:28 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:28 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 154.679492][ T9307] Dev loop0: unable to read RDB block 1 [ 154.685151][ T9307] loop0: unable to read partition table [ 154.728792][ T9307] loop0: partition table beyond EOD, truncated [ 154.788756][ T9307] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:28 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:28 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:28 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) 00:40:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:29 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 155.076935][ T9332] Dev loop0: unable to read RDB block 1 [ 155.082790][ T9332] loop0: unable to read partition table [ 155.100010][ T9332] loop0: partition table beyond EOD, truncated [ 155.116530][ T9332] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:29 executing program 4: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) sendfile(r0, r2, 0x0, 0x200fff) 00:40:29 executing program 4: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 155.551321][ T9357] Dev loop0: unable to read RDB block 1 [ 155.565935][ T9357] loop0: unable to read partition table [ 155.625737][ T9357] loop0: partition table beyond EOD, truncated [ 155.648566][ T9357] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:29 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:29 executing program 4: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) 00:40:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:29 executing program 4: r0 = socket$inet(0x2, 0x0, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 155.932777][ T9378] Dev loop0: unable to read RDB block 1 [ 155.939676][ T9378] loop0: unable to read partition table [ 155.959942][ T9378] loop0: partition table beyond EOD, truncated [ 155.967057][ T9378] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:30 executing program 4: r0 = socket$inet(0x2, 0x0, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:30 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:30 executing program 4: r0 = socket$inet(0x2, 0x0, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 156.357335][ T27] kauditd_printk_skb: 2193 callbacks suppressed [ 156.357343][ T27] audit: type=1326 audit(1585269630.394:2219): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x50000 [ 156.420722][ T9406] Dev loop0: unable to read RDB block 1 [ 156.423804][ T27] audit: type=1326 audit(1585269630.394:2220): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.426441][ T9406] loop0: unable to read partition table [ 156.469447][ T27] audit: type=1326 audit(1585269630.394:2221): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.506579][ T27] audit: type=1326 audit(1585269630.394:2222): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.541758][ T27] audit: type=1326 audit(1585269630.394:2223): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.561955][ T27] audit: type=1326 audit(1585269630.394:2224): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.582315][ T27] audit: type=1326 audit(1585269630.394:2225): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.605250][ T27] audit: type=1326 audit(1585269630.394:2226): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.627190][ T27] audit: type=1326 audit(1585269630.394:2227): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 156.629869][ T9406] loop0: partition table beyond EOD, truncated [ 156.647505][ T27] audit: type=1326 audit(1585269630.394:2228): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9403 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 00:40:30 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:30 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:30 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) [ 156.740268][ T9406] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:30 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:31 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:31 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 157.030498][ T9437] Dev loop0: unable to read RDB block 1 [ 157.053399][ T9437] loop0: unable to read partition table [ 157.059132][ T9437] loop0: partition table beyond EOD, truncated [ 157.093036][ T9437] loop_reread_partitions: partition scan of loop0 (JpfT)[qZ;(q-MSOLYQM: {hRHW/8iL ) failed (rc=-5) 00:40:31 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:31 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:31 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:31 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:31 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:40:31 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:31 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:31 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:32 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:32 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:32 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, 0x0, 0x0, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:32 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:40:32 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:32 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, 0x0, 0x0, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:32 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:32 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 158.638469][ T9536] fuse: Bad value for 'fd' 00:40:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, 0x0, 0x0, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:32 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:32 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 158.878243][ T9555] fuse: Bad value for 'fd' 00:40:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:33 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:40:33 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:40:33 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 159.518445][ T9584] fuse: Bad value for 'fd' 00:40:33 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:33 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:34 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:40:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {0x0}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:34 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:34 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:40:34 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:34 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {0x0}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:34 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:34 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {0x0}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:40:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:35 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:35 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:40:35 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:35 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:35 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:35 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 161.456820][ T27] kauditd_printk_skb: 2757 callbacks suppressed [ 161.456827][ T27] audit: type=1326 audit(1585269635.494:4986): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x50000 [ 161.511325][ T27] audit: type=1326 audit(1585269635.534:4987): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 00:40:35 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) [ 161.596989][ T27] audit: type=1326 audit(1585269635.534:4988): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.677940][ T27] audit: type=1326 audit(1585269635.534:4989): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.705139][ T27] audit: type=1326 audit(1585269635.534:4990): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.727255][ T27] audit: type=1326 audit(1585269635.534:4991): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.750540][ T27] audit: type=1326 audit(1585269635.534:4992): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.773929][ T27] audit: type=1326 audit(1585269635.534:4993): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.795896][ T27] audit: type=1326 audit(1585269635.534:4994): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 [ 161.817624][ T27] audit: type=1326 audit(1585269635.534:4995): auid=0 uid=0 gid=0 ses=4 subj=_ pid=9683 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45c849 code=0x50000 00:40:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:40:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:36 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:36 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:36 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e3", 0x4b}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:36 executing program 0: unshare(0x20000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:36 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:36 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:36 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e3", 0x4b}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:36 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:36 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e3", 0x4b}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:37 executing program 0: unshare(0x20000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbada", 0x71}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:37 executing program 0: unshare(0x20000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0x7ffff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) 00:40:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) 00:40:37 executing program 0: unshare(0x20000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x1c70, &(0x7f00000001c0), 0x10) 00:40:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbada", 0x71}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:37 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f00000001c0), 0x10) 00:40:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0x7ffff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) 00:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:37 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbada", 0x71}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f00000001c0), 0x10) 00:40:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0x7ffff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) 00:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:37 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f00000001c0), 0x10) 00:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe9", 0x84}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:38 executing program 0: mknod$loop(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:38 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:38 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x1c70, 0x0, 0x0) 00:40:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe9", 0x84}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:38 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x1c70, 0x0, 0x0) 00:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x0, 0x0}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:38 executing program 0: mknod$loop(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:38 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x4808c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x1c70, 0x0, 0x0) 00:40:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe9", 0x84}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:38 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x0, 0x0}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:38 executing program 0: mknod$loop(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:38 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000200)=@v2, 0x14, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 00:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x0, 0x0}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420", 0x8d}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:38 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:38 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:38 executing program 3: close(0xffffffffffffffff) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r0, &(0x7f0000000240)=""/227, 0xe3) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r1, 0x2008002) sendfile(0xffffffffffffffff, r1, 0x0, 0x200fff) 00:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:39 executing program 2: close(0xffffffffffffffff) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r0, &(0x7f0000000240)=""/227, 0x7ffff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(0xffffffffffffffff, r1, 0x0, 0x200fff) [ 164.976183][ T9934] fuse: Bad value for 'fd' 00:40:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420", 0x8d}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:39 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 165.129019][ T9948] fuse: Bad value for 'fd' 00:40:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:39 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 165.253239][ T9961] fuse: Bad value for 'fd' 00:40:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420", 0x8d}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:39 executing program 3: close(0xffffffffffffffff) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r0, &(0x7f0000000240)=""/227, 0xe3) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r1, 0x2008002) sendfile(0xffffffffffffffff, r1, 0x0, 0x200fff) 00:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:39 executing program 2: close(0xffffffffffffffff) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r0, &(0x7f0000000240)=""/227, 0x7ffff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(0xffffffffffffffff, r1, 0x0, 0x200fff) 00:40:39 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:39 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf", 0x92}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50000}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:40 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf", 0x92}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:40 executing program 3: close(0xffffffffffffffff) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r0, &(0x7f0000000240)=""/227, 0xe3) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r1, 0x2008002) sendfile(0xffffffffffffffff, r1, 0x0, 0x200fff) 00:40:40 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:40 executing program 2: close(0xffffffffffffffff) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r0, &(0x7f0000000240)=""/227, 0x7ffff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(0xffffffffffffffff, r1, 0x0, 0x200fff) 00:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf", 0x92}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:40 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 166.696336][ T27] kauditd_printk_skb: 568 callbacks suppressed [ 166.696344][ T27] audit: type=1800 audit(1585269640.735:5564): pid=10031 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15873 res=0 00:40:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 166.817570][ T27] audit: type=1326 audit(1585269640.855:5565): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10035 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 00:40:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7", 0x94}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:40 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 166.904351][ T27] audit: type=1800 audit(1585269640.945:5566): pid=10053 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15888 res=0 00:40:41 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:41 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7", 0x94}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:41 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 167.566839][ T27] audit: type=1800 audit(1585269641.605:5567): pid=10082 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15873 res=0 00:40:41 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 167.691010][ T27] audit: type=1326 audit(1585269641.735:5568): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10087 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 00:40:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7", 0x94}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 167.753280][ T27] audit: type=1800 audit(1585269641.795:5569): pid=10090 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15874 res=0 00:40:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 167.811947][T10108] fuse: Bad value for 'fd' 00:40:41 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 167.858586][T10115] fuse: Bad value for 'fd' 00:40:42 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 168.296395][T10123] fuse: Bad value for 'fd' 00:40:42 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9", 0x95}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:42 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 168.411465][ T27] audit: type=1800 audit(1585269642.455:5570): pid=10132 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15883 res=0 00:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:40:42 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 168.526648][T10145] fuse: Invalid rootmode [ 168.546010][ T27] audit: type=1326 audit(1585269642.585:5571): auid=0 uid=0 gid=0 ses=4 subj=_ pid=10146 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 00:40:42 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:42 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 168.572227][ T27] audit: type=1800 audit(1585269642.615:5572): pid=10149 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15918 res=0 00:40:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9", 0x95}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:42 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(0x0, 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 168.668603][T10158] fuse: Invalid rootmode 00:40:43 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:43 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 169.175963][T10178] fuse: Invalid rootmode 00:40:43 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:43 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9", 0x95}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:43 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 169.252088][ T27] audit: type=1800 audit(1585269643.295:5573): pid=10184 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15878 res=0 00:40:43 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8943, &(0x7f0000000000)={'ip_vti0\x00', {0x7, 0xffff, @loopback}}) 00:40:43 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:43 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:43 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvfrom$inet6(r0, &(0x7f0000000600)=""/32, 0x20, 0x10060, 0x0, 0x0) 00:40:43 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 00:40:43 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 00:40:44 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x6]) 00:40:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 00:40:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1, &(0x7f0000000640)=""/179, 0xb3}}], 0x2, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x127d, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 00:40:44 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, 0x0) 00:40:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{0x0}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, 0x0) 00:40:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30}, 0x30) 00:40:44 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1, &(0x7f0000000640)=""/179, 0xb3}}], 0x2, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x127d, 0x0) 00:40:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{0x0}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{0x0}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) ioctl$LOOP_SET_STATUS(r0, 0x40081271, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:44 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30}, 0x30) 00:40:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30}, 0x30) 00:40:45 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x2e8, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) 00:40:45 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1=0xe0000002}}, 0x0, 0x3, [{{0x2, 0x0, @dev}}, {{0x2, 0x0, @local}}, {{0x2, 0x0, @multicast2}}]}, 0x5000) 00:40:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r2, 0x10e, 0xb, &(0x7f0000000000)="c604007f", 0x4) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x201}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x401, 0x0, 0x0, {}, @NFT_OBJECT_CT_TIMEOUT=@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x3}, @NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x401}], {0x14}}, 0x84}}, 0x0) 00:40:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newtaction={0x18, 0x31, 0xffff, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 00:40:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x4000}, 0x30) 00:40:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:45 executing program 4: r0 = open(&(0x7f0000000100)='./bus\x00', 0x1a042, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8030) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) 00:40:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:45 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:45 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8030) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) 00:40:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8923, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @local}}) 00:40:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc", 0xb3}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:45 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 171.737252][ T27] kauditd_printk_skb: 18 callbacks suppressed [ 171.737259][ T27] audit: type=1800 audit(1585269645.775:5592): pid=10418 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15934 res=0 00:40:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:40:45 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x2, 0x3c8, 0x0, 0x2e0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) 00:40:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:45 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 171.843764][ T27] audit: type=1800 audit(1585269645.865:5593): pid=10430 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15945 res=0 00:40:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc", 0xb3}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:46 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x0, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 171.949270][ T27] audit: type=1800 audit(1585269645.995:5594): pid=10439 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15934 res=0 00:40:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'ip6tnl0\x00', 0x81}) 00:40:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 172.064796][ T27] audit: type=1800 audit(1585269646.105:5595): pid=10448 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15933 res=0 00:40:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc", 0xb3}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:40:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 172.196427][ T27] audit: type=1800 audit(1585269646.235:5596): pid=10455 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15943 res=0 00:40:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:46 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 00:40:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:46 executing program 0: creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/31) 00:40:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x10d}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 172.708573][T10485] fuse: Bad value for 'fd' [ 172.717338][ T27] audit: type=1800 audit(1585269646.755:5597): pid=10487 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15946 res=0 00:40:46 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) msync(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x2) 00:40:46 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 172.756105][ T27] audit: type=1800 audit(1585269646.785:5598): pid=10484 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15944 res=0 [ 172.814690][T10495] fuse: Bad value for 'fd' 00:40:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x10d}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:46 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:46 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000001c0)={0x2b, 0x3, 0x0, {0x0, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) [ 172.862293][ T27] audit: type=1800 audit(1585269646.905:5599): pid=10501 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15946 res=0 00:40:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 172.909879][ T27] audit: type=1800 audit(1585269646.935:5600): pid=10502 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15925 res=0 00:40:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x2}}, 0x1c}}, 0x0) 00:40:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 172.969563][ T27] audit: type=1800 audit(1585269647.005:5601): pid=10512 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15947 res=0 [ 173.008357][T10515] fuse: Bad value for 'fd' 00:40:47 executing program 4: r0 = socket(0x1e, 0x4, 0x0) sendmsg(r0, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) 00:40:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x10d}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:47 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8030) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 00:40:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a1170817de901ba2c7e83175e36c0d348be12a81d0d1eceb4a393797350700000036d6ca1eda0f0000000000000676238a001a0924a9f07222a04acc4830d79c36628b14dd9af876d3862921766ea55565d0929caf4d986666f8687a95c386d425e34cdebe2ef8e4e745f7a33983f0217da85d3d5668fdcb55966c574794db905d66854d207aa0"], 0x0, 0x87}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/6, 0x6}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x31) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 00:40:47 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000013c0)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r2, @ANYBLOB="000200080000000014001680100003800c10040008000081000000000800040000000000"], 0x3c}}, 0x0) [ 173.250684][T10546] ptrace attach of "/root/syz-executor.4"[10545] was attempted by "/root/syz-executor.4"[10546] 00:40:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x13a}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:47 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:47 executing program 1: mknod$loop(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, 0x0, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 1: mknod$loop(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 173.762995][T10558] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 00:40:47 executing program 0: unshare(0x20000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:47 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:47 executing program 1: mknod$loop(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x13a}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 173.840009][T10589] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 00:40:48 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:48 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x13a}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:48 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 174.101764][T10619] fuse: Bad value for 'fd' 00:40:48 executing program 0: unshare(0x20000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) unlink(&(0x7f0000000080)='./file0\x00') 00:40:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:48 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:48 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x150}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 174.951173][T10665] fuse: Bad value for 'fd' 00:40:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x150}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:49 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:49 executing program 4: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 175.134625][T10682] fuse: Bad value for 'fd' 00:40:49 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x2e0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) 00:40:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:49 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x150}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:49 executing program 4: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:49 executing program 4: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x15b}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 175.866205][ T216] tipc: Subscription rejected, illegal request [ 175.870875][T10708] x_tables: duplicate underflow at hook 1 00:40:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:50 executing program 0: r0 = socket$inet6(0x10, 0x80000000003, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="5500000018007f7000fe01b2a4a280930a600000fca84308910000003900090020000c00030000000d001500fe0000323ad5570800c78b8008231408000b9d1100b5df1d9033009284e7b1df136ef75a0000000000", 0x55}], 0x1}, 0x0) 00:40:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 176.000893][ T7] tipc: Subscription rejected, illegal request 00:40:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174", 0x15b}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) r4 = epoll_create(0x7f7fffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @empty}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x4) [ 176.155904][ T414] tipc: Subscription rejected, illegal request 00:40:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x15b}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:50 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 176.336768][ T7] tipc: Subscription rejected, illegal request 00:40:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96", 0x161}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:50 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0xe8030000}, 0x10) 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 176.541652][ T414] tipc: Subscription rejected, illegal request 00:40:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_getroute={0x30, 0x1a, 0x1, 0x0, 0x0, {0x2}, [@RTA_GATEWAY={0x14, 0x5, @rand_addr="b9f6c7ec5327ca7f33e368df998981fd"}]}, 0x30}}, 0x0) 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96", 0x161}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 176.736856][T10784] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 176.757734][ T27] kauditd_printk_skb: 29 callbacks suppressed [ 176.757742][ T27] audit: type=1800 audit(1585269650.796:5631): pid=10788 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15965 res=0 00:40:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:50 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 176.803355][ T216] tipc: Subscription rejected, illegal request [ 176.803389][T10793] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 00:40:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4400, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) [ 176.840660][ T27] audit: type=1800 audit(1585269650.796:5632): pid=10785 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15966 res=0 00:40:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x161}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:51 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(0x0, 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:51 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8030) truncate(&(0x7f0000000040)='./bus\x00', 0x0) 00:40:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:51 executing program 0: setrlimit(0x2, &(0x7f0000000000)={0x0, 0xfffffffffffffffe}) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d353ff072d68b2e4dc14aa5f7e25908384") r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:40:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d80400", 0x164}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 177.202829][ T27] audit: type=1800 audit(1585269651.246:5633): pid=10824 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15875 res=0 [ 177.233122][T10833] fuse: Bad value for 'fd' [ 177.322587][T10839] fuse: Bad value for 'fd' 00:40:51 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(0x0, 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(0x0, 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x164}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) [ 177.873844][T10864] fuse: Bad value for 'fd' 00:40:51 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 177.971015][T10878] fuse: Invalid rootmode 00:40:52 executing program 0: r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, &(0x7f0000000100)) 00:40:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 00:40:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x164}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 178.083145][T10891] fuse: Invalid rootmode 00:40:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) [ 178.167714][T10896] fuse: Invalid rootmode 00:40:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(0x0, 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 00:40:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0xffffffff]) 00:40:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x165}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(0x0, 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 00:40:52 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x165}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) unlink(0x0) 00:40:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 00:40:53 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x3, 0x0, {0x0, 0x4000}}, 0x30) 00:40:53 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 00:40:53 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 00:40:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x165}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(0x0, 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:53 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 00:40:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 00:40:53 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 00:40:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) unlink(0x0) 00:40:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:40:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:54 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:54 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3}, 0x30) 00:40:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:40:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:54 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:40:54 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3}, 0x30) 00:40:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) unlink(0x0) 00:40:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:55 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:55 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x3}, 0x30) 00:40:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:40:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="8afa628d19b6ada030b7ff76e599009fc8fb5ba32a41259b4d194307d03d2dbdbb9d72046bbb6c20d38cb3f30104e5035815c0aee919d98c270d0b041c689418fdc6b3ba2fee34892142d500817c23f79282e41a257037dfbb6a7acd8ce3815cf53a6effee2c95a9b2c1ce22a92bb9b18410f629f358e0648777c5daf92f079dd2d7b6b27c08ef3c9f8a1b22b5a000001b45330d6753a9f47252b135a70f6fae8ebcc950656c07afc6ac048390a3005603e4bc107264f75a7ca6d66fb85c9a19428fd69ead0642c4d181cf0b80b6a028e2d58d935d195baf962432bc5406c9e254145398c0dbf568152cfe47086b953ceec98a2bf82290a8bbaf0ba3f6c3683b52924dadc6355a2141a9b9778502e46942e780f391a21a04bc135163bf13c93c9bd068fd794487613af70ad36a01081aea6e453026cf63ef6c220b335c77c1d4d169dbf967c0af152c3fd96efc3f512fe72c981b59eaf8ed3c3174dd5dea963a96d804000000", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:55 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 00:40:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 00:40:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 00:40:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) unlink(0x0) 00:40:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:55 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1, &(0x7f0000000640)=""/179, 0xb3}}], 0x1, 0x10002, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 181.776791][ T27] audit: type=1800 audit(1585269655.816:5634): pid=11113 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15978 res=0 [ 181.919658][ T27] audit: type=1800 audit(1585269655.966:5635): pid=11113 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15978 res=0 00:40:56 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(0x0, 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:56 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x2, 0x2e0, 0xe8, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) 00:40:56 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:56 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x3a1800, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 182.287568][ T27] audit: type=1800 audit(1585269656.326:5636): pid=11133 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15793 res=0 00:40:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:56 executing program 4: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x20010003, 0x0) 00:40:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:56 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(0x0, 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 182.657922][ T27] audit: type=1800 audit(1585269656.696:5637): pid=11164 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15998 res=0 00:40:56 executing program 1: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:56 executing program 1: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:57 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:57 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(0x0, 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:57 executing program 1: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000080)=[0xffffffff]) [ 183.143830][ T27] audit: type=1800 audit(1585269657.186:5638): pid=11185 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15999 res=0 00:40:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 183.221996][ T27] audit: type=1800 audit(1585269657.186:5639): pid=11186 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16000 res=0 00:40:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:57 executing program 1: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 00:40:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:40:57 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:57 executing program 1: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) [ 183.532550][ T27] audit: type=1800 audit(1585269657.576:5640): pid=11212 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16002 res=0 [ 183.660695][ T27] audit: type=1804 audit(1585269657.586:5641): pid=11212 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir045728044/syzkaller.LUYv3s/104/bus" dev="sda1" ino=16002 res=1 00:40:57 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:40:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:57 executing program 1: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 00:40:57 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) [ 184.015302][ T27] audit: type=1800 audit(1585269658.056:5642): pid=11244 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15938 res=0 00:40:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 184.059204][ T27] audit: type=1804 audit(1585269658.056:5643): pid=11244 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir045728044/syzkaller.LUYv3s/105/bus" dev="sda1" ino=15938 res=1 00:40:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) splice(r2, 0x0, r3, 0x0, 0x80000001, 0x0) [ 184.227002][T11261] fuse: Bad value for 'fd' 00:40:58 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:58 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) [ 184.790982][T11281] fuse: Bad value for 'fd' 00:40:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)=[0xffffffff]) [ 184.863389][T11290] fuse: Bad value for 'fd' 00:40:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000001640)='.\xa2\xc5', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000340)="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", 0x166}, {&(0x7f00000004c0)="90717962ab383ab59056731dbfe5f0354098d39dce3a5702e24079e9ad1dec473ea8059e4fdf1ce8790f1a59144b1b386b5777613bf63df2803ce58ed461fc475fd81092243e16c94d51e30ebe4f01baf5497ef5c7fc121d66a9808c3bc8a763e72883ec8e36008916b55828cee0ddbadabd83f989ff162d6d34237e9c4b37d94075bbe98281e337e4c97ec420abfd27c9cf2ac7f9d0", 0x96}], 0x2, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff00d735bda5f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 00:40:59 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:59 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) splice(r2, 0x0, r3, 0x0, 0x80000001, 0x0) 00:40:59 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:40:59 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}}) 00:40:59 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:59 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:40:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) [ 185.605857][T11321] fuse: Bad value for 'fd' 00:40:59 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000080)=[0xffffffff]) 00:40:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:40:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:40:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:40:59 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:41:00 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) splice(r2, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:00 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:41:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:00 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:00 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, 0x0, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:41:00 executing program 5: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)) 00:41:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:00 executing program 5: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)) 00:41:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:00 executing program 5: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)) 00:41:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)) 00:41:00 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, 0x0, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:41:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) fcntl$dupfd(r5, 0x0, r6) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 186.822461][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 186.822468][ T27] audit: type=1800 audit(1585269660.866:5654): pid=11399 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15938 res=0 00:41:01 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:41:01 executing program 5: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)) 00:41:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) fcntl$dupfd(r5, 0x0, r6) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:01 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, 0x0, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:41:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) fcntl$dupfd(r5, 0x0, r6) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:01 executing program 5: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) [ 187.381162][ T27] audit: type=1800 audit(1585269661.426:5655): pid=11425 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15938 res=0 [ 187.443440][ T27] audit: type=1800 audit(1585269661.456:5656): pid=11426 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16007 res=0 00:41:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000080)) 00:41:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) epoll_create(0x7fffffff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:01 executing program 5: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:01 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 187.695010][ T27] audit: type=1800 audit(1585269661.736:5657): pid=11447 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15809 res=0 00:41:02 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x200fff) 00:41:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) epoll_create(0x7fffffff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:02 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:02 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) lstat(&(0x7f0000000140)='./file0\x00', 0x0) 00:41:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) epoll_create(0x7fffffff) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:02 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:02 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x2e0, 0xe8, 0x2e8, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) [ 188.277036][ T27] audit: type=1800 audit(1585269662.316:5658): pid=11469 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16020 res=0 00:41:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:02 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 188.556053][ T27] audit: type=1800 audit(1585269662.596:5659): pid=11493 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16011 res=0 00:41:03 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x200fff) 00:41:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:03 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)) [ 189.114859][ T27] audit: type=1800 audit(1585269663.156:5660): pid=11512 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16043 res=0 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)) 00:41:03 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(0xffffffffffffffff, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) [ 189.437295][ T27] audit: type=1800 audit(1585269663.476:5661): pid=11533 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16009 res=0 00:41:03 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x200fff) 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:03 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)) 00:41:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x127d, 0x0) 00:41:03 executing program 1: r0 = socket$inet6(0x10, 0x80000000003, 0x0) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="5500000018007f7000fe01b2a4a280930a600000fca84308910000003900090020000c00030000000d001600fe0000323ad5570800c78b8008231408000b9d1100b5df1d9033009284e7b1df136ef75a0000000000", 0x55}], 0x1}, 0x0) 00:41:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:04 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r0, &(0x7f0000000080), 0xfff2, 0x0, &(0x7f0000000080), 0x10) [ 189.939639][T11553] IPv6: NLM_F_CREATE should be specified when creating new route [ 189.960132][ T27] audit: type=1800 audit(1585269664.006:5662): pid=11555 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16045 res=0 00:41:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:04 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x200fff) [ 190.306502][ T27] audit: type=1800 audit(1585269664.346:5663): pid=11580 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16003 res=0 00:41:04 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:41:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:04 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:05 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x2d, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:05 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 00:41:05 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:41:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 00:41:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:05 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80104592, &(0x7f0000000080)=[0xffffffff]) 00:41:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:05 executing program 1: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 00:41:05 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:05 executing program 1: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000040), 0x4) 00:41:06 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x0) sendfile(r0, r2, 0x0, 0x200fff) [ 192.061890][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 192.061899][ T27] audit: type=1800 audit(1585269666.106:5667): pid=11673 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15973 res=0 00:41:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:41:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 00:41:06 executing program 1: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/226, 0xe2}], 0x1}}], 0x1, 0x10122, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) 00:41:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(0xffffffffffffffff) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 00:41:06 executing program 1: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) [ 192.473708][ T27] audit: type=1800 audit(1585269666.516:5668): pid=11692 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15809 res=0 00:41:06 executing program 1: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) [ 192.550789][ T27] audit: type=1800 audit(1585269666.546:5669): pid=11693 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16007 res=0 00:41:06 executing program 1: r0 = syz_open_dev$evdev(0x0, 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) [ 192.722760][ T27] audit: type=1800 audit(1585269666.767:5670): pid=11692 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15809 res=0 00:41:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1081004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x129003a, &(0x7f0000000040)={[{@journal_async_commit='journal_async_commit'}]}) 00:41:06 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x200fff) [ 192.973625][ T27] audit: type=1800 audit(1585269667.017:5671): pid=11721 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16057 res=0 [ 193.015878][T11714] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 193.052345][T11714] EXT4-fs (sda1): re-mounted. Opts: journal_async_commit, [ 193.146077][T11726] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 193.163743][T11726] EXT4-fs (sda1): re-mounted. Opts: journal_async_commit, 00:41:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x0) 00:41:07 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:07 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000402) sendfile(r0, r3, 0x0, 0x7fffffff) 00:41:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 193.358388][ T27] audit: type=1800 audit(1585269667.407:5672): pid=11743 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16065 res=0 [ 193.399585][ T27] audit: type=1804 audit(1585269667.437:5673): pid=11743 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir499555327/syzkaller.M45gZ5/156/file0" dev="sda1" ino=16065 res=1 00:41:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 193.503567][ T27] audit: type=1804 audit(1585269667.437:5674): pid=11743 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir499555327/syzkaller.M45gZ5/156/file0" dev="sda1" ino=16065 res=1 [ 193.556838][ T27] audit: type=1800 audit(1585269667.477:5675): pid=11747 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15688 res=0 00:41:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:07 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x200fff) 00:41:07 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=[0x1]) [ 193.881848][ T27] audit: type=1800 audit(1585269667.927:5676): pid=11767 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15752 res=0 00:41:08 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x0) 00:41:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:08 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x1}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x0, 0x6}) 00:41:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:08 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=[0x1]) 00:41:08 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x2812, r0, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000140)=ANY=[@ANYRES64], 0x8) modify_ldt$read_default(0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:41:08 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 194.499076][T11804] ref_ctr going negative. vaddr: 0x20002004, curr val: 0, delta: -1 [ 194.512066][T11804] ref_ctr decrement failed for inode: 0x3ec3 offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000153ccf9c [ 194.544534][T11804] ref_ctr going negative. vaddr: 0x20002004, curr val: 0, delta: -1 [ 194.561899][T11804] ref_ctr decrement failed for inode: 0x3ec3 offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000153ccf9c 00:41:08 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(0xffffffffffffffff, r2, 0x0, 0x200fff) 00:41:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0x7ffff000) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x0) 00:41:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0xffff0000}], 0x1, 0xffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:41:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, 0x0) 00:41:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:09 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:41:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x0, 0x4000000000401, 0xb1000000}, {}, {0x6}]}, 0x10) 00:41:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xec7e, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x80284504, &(0x7f0000000040)) 00:41:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:10 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x3c8, 0x0, 0x2e0, 0xe8, 0x2e0, 0x2e0, 0xe8, 0x4, 0x0, {[{{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@link_local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vlan1\x00', 'syzkaller1\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @rand_addr, @local}}}, {{@arp={@rand_addr, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) 00:41:10 executing program 2: 00:41:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:10 executing program 1: 00:41:10 executing program 2: 00:41:10 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:41:10 executing program 1: 00:41:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:10 executing program 2: 00:41:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:10 executing program 1: 00:41:10 executing program 5: 00:41:10 executing program 2: 00:41:11 executing program 1: 00:41:11 executing program 5: 00:41:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:11 executing program 2: 00:41:11 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x200fff) 00:41:11 executing program 1: 00:41:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 197.329438][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 197.329447][ T27] audit: type=1800 audit(1585269671.377:5684): pid=11943 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15744 res=0 00:41:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:11 executing program 1: 00:41:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:11 executing program 2: 00:41:11 executing program 1: 00:41:11 executing program 2: 00:41:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r3) r4 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r5 = epoll_create(0x7fffffff) r6 = fcntl$dupfd(r4, 0x0, r5) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 00:41:12 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x0) 00:41:12 executing program 1: 00:41:12 executing program 2: [ 198.200836][ T27] audit: type=1800 audit(1585269672.247:5685): pid=11980 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16078 res=0 00:41:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:12 executing program 2: 00:41:12 executing program 1: 00:41:12 executing program 1: 00:41:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:12 executing program 2: 00:41:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:13 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x0) 00:41:13 executing program 1: 00:41:13 executing program 2: [ 199.085394][ T27] audit: type=1800 audit(1585269673.127:5686): pid=12015 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15754 res=0 00:41:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:13 executing program 1: 00:41:13 executing program 2: 00:41:13 executing program 2: 00:41:13 executing program 1: 00:41:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:13 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000001dc0)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) read(r1, &(0x7f0000000240)=""/227, 0xe3) r2 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0x7}, 0x7) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x0) 00:41:13 executing program 2: 00:41:13 executing program 1: [ 199.971355][ T27] audit: type=1800 audit(1585269674.017:5687): pid=12051 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16110 res=0 00:41:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:14 executing program 2: 00:41:14 executing program 1: 00:41:14 executing program 1: 00:41:14 executing program 2: 00:41:14 executing program 1: 00:41:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}) close(r2) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = epoll_create(0x7fffffff) r5 = fcntl$dupfd(r3, 0x0, r4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 00:41:14 executing program 2: 00:41:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:15 executing program 3: 00:41:15 executing program 1: 00:41:15 executing program 2: 00:41:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:15 executing program 1: 00:41:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:15 executing program 3: 00:41:15 executing program 2: 00:41:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:15 executing program 2: 00:41:16 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:16 executing program 3: 00:41:16 executing program 1: 00:41:16 executing program 2: 00:41:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:16 executing program 2: 00:41:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:16 executing program 3: 00:41:16 executing program 1: 00:41:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:16 executing program 2: 00:41:16 executing program 1: 00:41:16 executing program 3: 00:41:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000004c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0xfffffffffffffffd}}, 0x30) 00:41:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:17 executing program 2: 00:41:17 executing program 1: 00:41:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4, 0x2812, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="660f1a"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 00:41:17 executing program 2: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='mqueue\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./bus/file1\x00', 0x0, 0x1) 00:41:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001a80)="b9ff0300600d698cb89e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:41:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}}) close(r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r6 = epoll_create(0x7fffffff) r7 = fcntl$dupfd(r5, 0x0, r6) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 00:41:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 00:41:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x25, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) [ 203.481418][T12189] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 203.544766][T12189] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 203.552597][T12189] #PF: supervisor instruction fetch in kernel mode [ 203.559091][T12189] #PF: error_code(0x0010) - not-present page [ 203.565066][T12189] PGD a322b067 P4D a322b067 PUD a2cca067 PMD 0 [ 203.571317][T12189] Oops: 0010 [#1] PREEMPT SMP KASAN [ 203.576513][T12189] CPU: 0 PID: 12189 Comm: syz-executor.2 Not tainted 5.6.0-rc7-syzkaller #0 [ 203.585178][T12189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.595242][T12189] RIP: 0010:0x86 [ 203.598798][T12189] Code: Bad RIP value. [ 203.602869][T12189] RSP: 0018:ffffc90002547998 EFLAGS: 00010086 [ 203.608930][T12189] RAX: ffffc900025479c8 RBX: fffffe0000000000 RCX: 0000000000040000 [ 203.616903][T12189] RDX: ffffc9000e294000 RSI: 000000000000363d RDI: 000000000000363e [ 203.624884][T12189] RBP: 0000000000000ec0 R08: ffffffff8398c3c3 R09: ffffffff811c7eca [ 203.632861][T12189] R10: ffff88804c10a140 R11: 0000000000000002 R12: dffffc0000000000 [ 203.640956][T12189] R13: fffffe0000000ec8 R14: ffffffff880016f0 R15: fffffe0000000ecb [ 203.648940][T12189] FS: 00007f86bbd10700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 203.657958][T12189] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.664542][T12189] CR2: 000000000000005c CR3: 00000000a7445000 CR4: 00000000001426f0 [ 203.672520][T12189] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.680491][T12189] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 203.688459][T12189] Call Trace: [ 203.691761][T12189] ? handle_external_interrupt_irqoff+0x154/0x280 [ 203.698185][T12189] ? handle_external_interrupt_irqoff+0x132/0x280 [ 203.704603][T12189] ? __irqentry_text_start+0x8/0x8 [ 203.709759][T12189] ? vcpu_enter_guest+0x6c77/0x9290 [ 203.714957][T12189] ? __kasan_slab_free+0x1ac/0x1e0 [ 203.720043][T12189] ? __kasan_slab_free+0x12e/0x1e0 [ 203.725125][T12189] ? kfree+0x10a/0x220 [ 203.729168][T12189] ? tomoyo_path_number_perm+0x525/0x690 [ 203.734771][T12189] ? security_file_ioctl+0x55/0xb0 [ 203.739916][T12189] ? __se_sys_ioctl+0x48/0x160 [ 203.744651][T12189] ? do_syscall_64+0xf3/0x1b0 [ 203.749299][T12189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.755427][T12189] ? format_decode+0x466/0x1ce0 [ 203.760278][T12189] ? __lock_acquire+0xc5a/0x1bc0 [ 203.765218][T12189] ? mark_lock+0x107/0x1650 [ 203.769699][T12189] ? lock_acquire+0x154/0x250 [ 203.774365][T12189] ? rcu_lock_acquire+0x9/0x30 [ 203.779126][T12189] ? kvm_check_async_pf_completion+0x34e/0x360 [ 203.785257][T12189] ? vcpu_run+0x3a3/0xd50 [ 203.789575][T12189] ? kvm_arch_vcpu_ioctl_run+0x419/0x880 [ 203.797205][T12189] ? kvm_vcpu_ioctl+0x67c/0xa80 [ 203.802035][T12189] ? kvm_vm_release+0x50/0x50 [ 203.806702][T12189] ? __se_sys_ioctl+0xf9/0x160 [ 203.811468][T12189] ? do_syscall_64+0xf3/0x1b0 [ 203.816128][T12189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.823143][T12189] Modules linked in: [ 203.827027][T12189] CR2: 0000000000000086 [ 203.831291][T12189] ---[ end trace a625b77964b3e297 ]--- [ 203.836751][T12189] RIP: 0010:0x86 [ 203.840303][T12189] Code: Bad RIP value. [ 203.844347][T12189] RSP: 0018:ffffc90002547998 EFLAGS: 00010086 [ 203.850391][T12189] RAX: ffffc900025479c8 RBX: fffffe0000000000 RCX: 0000000000040000 [ 203.858364][T12189] RDX: ffffc9000e294000 RSI: 000000000000363d RDI: 000000000000363e [ 203.866314][T12189] RBP: 0000000000000ec0 R08: ffffffff8398c3c3 R09: ffffffff811c7eca [ 203.874282][T12189] R10: ffff88804c10a140 R11: 0000000000000002 R12: dffffc0000000000 [ 203.882665][T12189] R13: fffffe0000000ec8 R14: ffffffff880016f0 R15: fffffe0000000ecb [ 203.890615][T12189] FS: 00007f86bbd10700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 203.899520][T12189] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 203.906093][T12189] CR2: 000000000000005c CR3: 00000000a7445000 CR4: 00000000001426f0 [ 203.914114][T12189] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 203.922126][T12189] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 203.930097][T12189] Kernel panic - not syncing: Fatal exception [ 203.937434][T12189] Kernel Offset: disabled [ 203.941772][T12189] Rebooting in 86400 seconds..