0, 0x0, 0x25dfdbfe, 0x1000488}, 0xc) 03:50:28 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket(0x6, 0x2, 0x2) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'veth0_to_bond\x00', @ifru_data=&(0x7f0000000000)="0a2df9b1d428c3c05afffca3d43ff022dd0562de57649388b7d676c88a629eb8"}}) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:50:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}, {&(0x7f0000000580)="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", 0x1000, 0x8}, {&(0x7f00000001c0)="b4dbb958decb6d7a4f70d8c8a84c5581148f5be7dcc1b1a7747f97c17944ea418440857dcec3e7cea261997c670a305758a9e6d9dbba8168e16d3cdb0560676c4dd95519dd1b0d9fe2a5c40131b4b6e920e100b8af63c137d17082944eb520fb2dc3b549a64de2dee93b0619f2b2e75a0c8d758016f59b45f1e3edcb3148e00e4e317a604e50a099ce369fd08497b948e6c7ea360e8daf1825afe952c5aa0ecab7ce5582bda474e983c88cc4d0f4146a702c54abd064983722a594c3057c84c69fba9c17", 0xc4, 0x8}, {&(0x7f0000001580)="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", 0x1000, 0x3}, {&(0x7f00000003c0)="f0ec495d91d3e0bafe6ec877d1b2b54bbe40c50e694a8515292e8b6924b3b6c31415981598188453c942cf5c79a26821a42ead98095654b60d4295d7596d5325c8f163840a64d7e0aa3997eb204c91ad10a2ba2c9e4e7178c9a42813e5af9cf72fe1b1833c6cdceada704e944c76cc3a9bc48f32f7f1d62061e1555c322468638bb97173782c4536bc10d3e71770b54aa3465237b817e05ac3fc77c7b80fa0309a18aab421fdfed10f2fbfe1b449b6749730c71627c1babb566fb56a33b5212786d45baed1cdca8d0cb16675e9f4dff18716477c09399d892a6626", 0xdb, 0x7fffffff}], 0x182e8e0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:28 executing program 5: r0 = socket(0x22, 0x2, 0x2) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x2, 0x0, 0x1}}, 0x10) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 595.992255][ T27] kauditd_printk_skb: 17 callbacks suppressed [ 595.992267][ T27] audit: type=1800 audit(1584762629.239:875): pid=18204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17809 res=0 03:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x400, 0x0, 0xffffffff, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x40) 03:50:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:29 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r2 = socket(0x22, 0x2, 0x2) getpeername$inet(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000300)={'wg1\x00', r3}) 03:50:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f00000001c0)="66a070f63e86a7881e6cd3ff6f6a7fdffdf4434a8b6607605533a225f35ca8dd5ea588715092dd7d607334fb69b790c95bdd570bc3eb25e74407c715624f78e00d29f23cd5f1c77b47d9d0c010f14908d3ded1a3ff67c1f8d0be5065f493a290b4b630f71a26a7a0f02ae533d76b7e00b1023bcff6ce503237c9a4fb5e941ccb04624a23c28702d8bd177a9c31b208d137d8c1038693fbf2d92fa31d14c4302cfa17e4776183b1416d5c29d6239fb024b34a38e7ed4ce08cfc860c0c403879652a67e5e8d3b9b48f1d77e142d159c921668382253b26f365b5666cc3b7afd0e87b4b305c1e18928ab2abe6be42a6bd05deb30f7b302783302b8df3e120fccb10") r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x109500, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendmsg$rds(r5, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/252, 0xfc}], 0x1, &(0x7f00000002c0)=[@zcopy_cookie={0x18, 0x114, 0xc, 0x7f}], 0x18, 0x20004800}, 0xc000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000580)={@any, 0x9, 0x5, 0x2, 0x7fff, 0x7, "622f2072b28831f2f8028a4db124508af878bc210dc935b150495458917949d86ae2fa0022843b98635f37f84ecc204b78d92b0c25e3f5bb4ec085bb1f7720c43a3bcd77a2c89342e29234ce74e6d2f5f413345488d384ee2f34f1ae191b046d4850c629fefa152a0ced2565bfdbc87bba184b59dde0a4eeab2fc92edfab4ccd"}) sendfile(r1, r3, 0x0, 0x7fffffa7) [ 596.266214][ T27] audit: type=1804 audit(1584762629.269:876): pid=18204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/288/file0/file0" dev="sda1" ino=17809 res=1 03:50:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340009001000000000000000000000000000000017efd8df244fc158ac6e62054ec2084a18071f14af6ec924ba232285950c098dfb9631c4d50b6a38ae23b336c83fd8cfbca5aee0beed4a52b4655afaddc51b887856cc9ab0b8", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280", @ANYRESHEX=r1], 0x4}}, 0x0) [ 596.471043][ T27] audit: type=1800 audit(1584762629.329:877): pid=18205 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17756 res=0 03:50:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:29 executing program 5: ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f00000000c0)) r0 = socket(0x22, 0x2, 0x2) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3b07, 0x88000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000018001280081003ea6f7070000c000280080001005ff31b24cc2bd12667699e1bb3ed3427171f7d4ff466c51f472baa024ad1e3f9cbad36da8c6a4719d6b7a59922d973a8f2e4c65abcd6d50dd6a40cc729fb09bb4c93fe5682052c8d093604d38a16af5f1b876ad7b34ec51f5c2c15ddd8aced4c28e3f61667beb88ac47f21f7e4c204d86f9b7f90fdbb1e8c3793483030d2fefb24663cf4f0e5d10d209616ad65911efcd56765b491ae6ca0ff6ea55979d5ff1ae2ca13d88e4158233a92ee4502f3cd107215271b9ab80852a52f58c8160214", @ANYRES32=r2, @ANYBLOB="08001f0000000000"], 0x40}}, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), &(0x7f0000000440)=0x14) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="100f00000b140300a80bb10c81f6ac084e25bd7100fddbdf25"], 0x10}, 0x1, 0x0, 0x0, 0x801}, 0x4000095) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000500)={0x1, 0x10, 0xfa00, {&(0x7f00000004c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0x38, "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", 0x6, 0x0, 0xc0, 0x7, 0x7, 0x3, 0x40}, r6}}, 0x128) r7 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x200881) write$P9_RLCREATE(r7, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x80, 0x3, 0x4}, 0x1}}, 0x18) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000340)={{}, [@netrom, @remote, @remote, @null, @bcast, @netrom, @bcast, @default]}, &(0x7f00000003c0)=0x48, 0x80800) [ 596.667258][ T27] audit: type=1804 audit(1584762629.439:878): pid=18206 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir924473450/syzkaller.uLh8jd/82/file0/file0" dev="sda1" ino=17756 res=1 [ 596.700562][ T27] audit: type=1800 audit(1584762629.829:879): pid=18230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17790 res=0 [ 596.744104][ T27] audit: type=1804 audit(1584762629.859:880): pid=18230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/289/file0/file0" dev="sda1" ino=17790 res=1 03:50:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x5}, 0x16, 0x5) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r5 = syz_open_dev$vcsn(&(0x7f0000001880)='/dev/vcs#\x00', 0xd831, 0x200080) recvmsg$can_raw(r5, &(0x7f0000001bc0)={&(0x7f00000018c0)=@x25, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001940)=""/36, 0x24}, {&(0x7f0000001980)=""/153, 0x99}, {&(0x7f0000001a40)=""/141, 0x8d}, {&(0x7f0000001b00)=""/44, 0x2c}], 0x4, &(0x7f0000001b80)=""/8, 0x8}, 0x140) 03:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FBIO_WAITFORVSYNC(r2, 0x40044620, 0x0) [ 596.794548][T18240] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 596.815318][T18240] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 03:50:30 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r1, 0x500e, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000040)={{0x3, 0x0, @reserved="d8f302536a289053f6e8ee0e498f85f03467089f5ea618dd69a50fb87bd4ced8"}}) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000000)) [ 597.066802][ T27] audit: type=1800 audit(1584762630.319:881): pid=18249 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=145 res=0 [ 597.119578][ T27] audit: type=1804 audit(1584762630.319:882): pid=18249 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/290/file0/file0" dev="loop3" ino=145 res=1 03:50:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x14, r2, 0xdaa3b002485c5b6d, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r4}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f00000000c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYPTR64=&(0x7f0000000e40)=ANY=[@ANYRES16=r4, @ANYRES64=r5, @ANYBLOB="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", @ANYRESHEX]], 0x3}, 0x1, 0x0, 0x0, 0x8081}, 0x80880) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000001000"/20, @ANYRES32=0x0, @ANYBLOB="0000f7ff000000001400120009000100626f6e640000000004000280"], 0x34}}, 0x0) 03:50:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0x500e, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0xfffffffd) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r5, 0xc0585604, &(0x7f00000001c0)={0x0, 0x0, {0x9, 0xff, 0xa4e67c8de59f0d5c, 0x9, 0x9, 0x0, 0x1}}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r6, r3, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) 03:50:30 executing program 5: r0 = socket(0x22, 0x2, 0xc482) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$vhci(r2, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, "0393b4147773c03adf8ee473bd9dc3cd5ad603e8b065246d1fdab4bf24aa33758717cae300"}, 0x26) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 597.627283][ T27] audit: type=1800 audit(1584762630.879:883): pid=18276 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=146 res=0 03:50:31 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'tunl0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}]}}}]}, 0x3c}}, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r6}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) sendmsg$SOCK_DESTROY(r5, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000080}, 0x4) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, &(0x7f0000000440)={0x1, 0x0, {0x7dde, 0x1b, 0x0, 0xa2}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(r4, 0x80024321, &(0x7f0000000000)) getegid() 03:50:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="1d00000000000000000000000000000000000000607ab54d2d18a07a6fdaea8bbd7be359038c9a5c07e39d9d14041bd76f4558830dcbcc894e1fafe8803dfe4cf6e1547ab6e2be35600b9f83bb46dfd72007fb3cc66649c5229a1a4a9d387676cd49a6d97d256347767c3dfc5e0af88c89ce7888a6536c8e46087b1f022365a91c08a08793887f3ac5cf79432a786f9bda9696a367c600a721aa703ecf882d8dd9aa34653eb76a1f3513c11af9e33325abfe74dc80d512f206c076a07259de68742f24a805e96b7ddc70020b2d0fd9427b0b6ddc73965de737d018a235ac44dcf779800802b66869505619", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) [ 597.825119][ T27] audit: type=1804 audit(1584762630.919:884): pid=18276 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir924473450/syzkaller.uLh8jd/84/file0/file0" dev="loop0" ino=146 res=1 03:50:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10500, 0x52) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0xae87930e1d8a3e9f) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfff9}, &(0x7f0000000240)=0x8) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) unlinkat(r7, &(0x7f00000001c0)='./file0\x00', 0x200) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f0000000140)={0x9e0000, 0x9, 0x200, r6, 0x0, &(0x7f0000000040)={0x99096b, 0x7fff, [], @ptr=0x1}}) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:31 executing program 5: r0 = socket(0x25, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:50:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00@\x00', @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f0000000080)=""/67, 0x43}], 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)=""/242, 0xf2}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000340)={0x9a0000, 0x81, 0x5, r4, 0x0, &(0x7f0000000300)={0x990a96, 0x6, [], @string=&(0x7f00000002c0)=0xee}}) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000480)={0x4, 0x10000, 0xa8, r5, 0x0, &(0x7f0000000440)={0x980906, 0x9, [], @string=&(0x7f00000003c0)}}) ioctl$DRM_IOCTL_GET_MAP(r6, 0xc0286404, &(0x7f0000000380)={&(0x7f0000ffc000/0x4000)=nil, 0x400, 0x5, 0x60, &(0x7f0000ffa000/0x3000)=nil, 0x5}) 03:50:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000016011148f5ea5323b443f81000"/31, @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) 03:50:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4101010}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0xc00, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xe3, 0x2}}]}, 0x20}, 0x1, 0x0, 0x0, 0x24004841}, 0x4004060) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r5, 0x400454da, 0x0) ioctl$SIOCGIFHWADDR(r5, 0x8927, &(0x7f0000000040)) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) fanotify_init(0x2, 0x8000) dup3(r6, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) 03:50:32 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000068000024ff757948baa702f1844fec00020000000000000000000004000000000000a41b8c5fb99e7b4d1ad38e"], 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r3, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=""/53, 0x35, r4}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r4, 0x4) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) accept$netrom(r6, &(0x7f0000000180)={{0x3, @netrom}, [@netrom, @rose, @remote, @bcast, @bcast, @bcast, @bcast, @bcast]}, &(0x7f0000000240)=0x48) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) r7 = fcntl$dupfd(r0, 0x406, r0) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000140)={'ip_vti0\x00'}) 03:50:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000100000000077bf6e3549fa322f3e647f5e70b835d7456cc8bc32ff92ad598204195b007d5b778235d200000000000000bc2af63726a44562388c", @ANYRES32, @ANYRESHEX=r0], 0x3}}, 0x80) [ 599.028382][T18337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18337 comm=syz-executor.3 [ 599.109767][T18343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18343 comm=syz-executor.3 03:50:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce8"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:32 executing program 5: r0 = socket(0x15, 0x2, 0x4) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:50:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000007b00)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="e1426197c04e15a6510cd1297ee18b6be1c70648af81b297420675324c2f8eec85b5502d757396a579a979e67a974ffe661bf54430b0f89eff2d821ff53b24f5153b5fc103d17c59ed54f724dcb01d9f2428c6eb11e92ae9e91caa9d1148d3cb24a0175ae5f7ee99c2", 0x69}, {&(0x7f0000000040)="a5fd", 0x2}, {&(0x7f0000000240)="a03ef279c8b443f139edd2dbbcbb43d7fa799c8d0f1fa50e9497f4dbabc52bd89cafadca26e64848fee83da92aa4c170125a4a1b6832a07a5013fe0a09027d9ce87de62acfe1d295bf3eff58b54cc86841fca68ce76158641125d608396a0093a85de52523909a8d83dd45e7edf52ae9bce659ba511dc62b9ee6923497a86716b4f63e539ff39c4aee1f7b7da88a505ea0dcba9f37209cd720e433bfa195e717022fe1548465730a1263677192bdb39cb331bf9fee60c44757cc099ee9", 0xbd}], 0x3, &(0x7f0000000580)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0x28, 0x117, 0x2, 0xf, "70b14d3fd9a5bddd5fa57eade226d6"}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x1070, 0x8040}, {0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000003c0)="4aa217ae4aad7bacb24744d47fa948cc10e3805cacb7e0a80c265d21f31cd6113f8bd962b9de7635df7f1f726832ecb3b2b6b784137a12824dc4ee72233d2ee1c255bd60f71205fbcdaa609bf58fefe81162478af1eab637ede2bc04fd8d29a6f350c98d2f349c5bf3db71c888adbf40f6ed49eede53a8a4c80239331bbaf2c5f741dddb22fa3eca1b10b12e11e2c982c705ec14f571", 0x96}, {&(0x7f0000000300)="d0c122eb21cbd33ed02bddcf5ccd453f8ef6b33ef65821b0c28a42", 0x1b}, {&(0x7f0000000340)="5a7afbfbf092a1972735468ee2956585c53b9bc8fe679a28067647fec9dd302b600d03b25b38ae7607aace673ced127559d2b6f73ade7f84bc6c", 0x3a}], 0x3, &(0x7f00000004c0)=[@op={0x18}, @iv={0x20, 0x117, 0x2, 0x6, "4b3870c4ebbd"}], 0x38, 0x4000000}, {0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000001600)="4c223f9e64c0d42e8918d2c8b349de36b1d3db6c6bb7a757da11bea53157f34bed4f8e07a2b6f009cd31179e17ff8edcf56cd97c568b9a275e5446a8a8d015e01b133490ef85bd25de8fe9841fd2879d58e8b327bee47e7937bbc36e50de91c8aabf7dd11b714fd4fce4b26c7ca4ecd2e095123d16dbb6c7bc0d223b702bdf729eab3ca706f53d6125ae2456d9f08e19e4569f4ef252fcb5", 0x98}, {&(0x7f00000016c0)="04aa9af47744bcca3eab22661f593c18fea223e412ab4834a6043c601eac13f9d7323f37b7a6273d006ce16f40078a762cbef2ee62c0dde593d8a23cc6830aa350f7c5df13cc7d", 0x47}], 0x2, &(0x7f0000001740)=[@assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x60, 0x117, 0x2, 0x4c, "59708dfd5d9ab01fc4964eb56d3165c2b7373574b0ca42e051842db29d021d7baf78877b1f4ed30b05bc2c6da21455b24a81ee33833541c7a4992d2833c4801595887b143d7565736e3b9034"}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x401}], 0xf0, 0x4008001}, {0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001840)="1b90365adfc7e9cb71d2ae9ebcff09ab7e2b2d4b32c4318cee0c1ebf9448c8f49bee31da3f5ae72ae34f1da07f6e916466ec4f66217bcfb675e61e08cd6701957d43e76c779229c1af9781a0eab01b0739519bbbb42ff46f6bab92d1ec3f22eff21bb3c750dbfc11655bf1a96c1e7ede4804697ed1a586dded04d12c43a4ea7fed98ad554c26741219b101dfa0bca1a8799e3c553cb511552cb5349739aff0cc096bac93ca08f9", 0xa7}, {&(0x7f0000001900)="c05bbe83fbfb13fb273dfd710f78c8aa7b798aa4fa9ccbfbacdad8947fd2a90cb97cc4d73b095142c5bfdbc0ea7a6f1f47285599712fe7b7c38f427ba3317cb0acdf00", 0x43}], 0x2, &(0x7f00000019c0)=[@iv={0x68, 0x117, 0x2, 0x51, "68b449c35f3a4c9c82a550c2977ccc59827352f579a62a0304c191644d4f726a471885f941bebcc0fd2cc3a1bf9b87f85f62d1db301aca028b99119f548fc24d8620e703b73fc36a30d4105d17218bcadf"}, @op={0x18}], 0x80, 0x44001}, {0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000002a40)="6e22ef97", 0x4}, {&(0x7f0000002a80)="76a1833d011c84e0ee4668744f2cdd66", 0x10}, {&(0x7f0000002ac0)="684ac8b783bc8c2972faba0ed702f398bb0180e9b11c3a421999958af4c337818307d1a81e506b3a9754a60ff3ee79647471f0b12daa4619198616903e8a10d79b74e68410", 0x45}, {&(0x7f0000002b40)="d255c94c0ea435f3f0844dfc6104c21ef40c51abda3a97cb4a3989ef69a87d16f918ed5d822dde20ec1abc053dc94ea9230ca3d27c8dfe1858ab7d5860e3daecc59cd33a33da8b9de483f8ddb3373e349dacb634219c268167dde54d2e7c04e9", 0x60}, {&(0x7f0000002bc0)="d1e8dbf45295875da0a0010231f214a94207ab2ca2e2e73af504f8b699bf7523bbcaa895dd099a74f86db5073ac01f93618a90035c3daf98e94643f9ab6c180a5d725e2cf2ca5b38fe", 0x49}, {&(0x7f0000002c40)="c73839a5680f087a02f8f8c1c0e2a5a98a48a5db4d857e14f9c925ee", 0x1c}], 0x7, &(0x7f0000002d00)=[@iv={0xa0, 0x117, 0x2, 0x8a, "8337205096be46c8e2121487e160c4b165664026c696b846c7c8a28cf32489856f2b4fe85b52e37cde2becebe4919fd7e6238b5e86abcdc8438b2dfa9e2d75561cdefc8777b5aaa71650bd57a762517a67cb25bbc11176bf666ffb41033b3f896ddd19db2ae22d59f5e235b97c3e2768150dde9903922ffef6019a75bd674634c58e59e5279a45dd1ac6"}, @op={0x18}], 0xb8}, {0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000002dc0)="2cb8d709f5cb7f81af269c03e88fe2da12ed4c0d63562dd6745953246cf452ab4189ca8ace1dcb21d0482aeb1bcee5e31b91584a05172eaf7d7adeb61a7aa7caa5e0078182f07db66371e796de4a525b84577b433a4105925654cfe33c7d6375d2b158b243f6cf95c733be", 0x6b}, {&(0x7f0000002e40)="f953a8fe85097dcb28d7b67f79a1d47d51d892cf695d35445cab50f3e60c4cc780f96163c26a7da7fb1513201ed13cc689df8fe5", 0x34}, {&(0x7f0000002e80)="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", 0x1000}], 0x3, &(0x7f0000003ec0)=[@assoc={0x18, 0x117, 0x4, 0xff}], 0x18, 0x40000}, {0x0, 0x0, &(0x7f00000060c0)=[{&(0x7f0000003f00)="ab9b46ce939ed3303977a58d984df7be6880e2cf8241f93d5cad05a56afa016135f627a8e5b1fade76756f91aaf2b6fa7a74c71205e0", 0x36}, {&(0x7f0000003f40)="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", 0x1000}, {&(0x7f0000004f40)="7f09c20046eb9c9577f241e97f9888c9a5f5de711120bc0c29c18bbbffc6a8da049f1d95361a92caa48da3d2eb67af889fa5f2ce7a572d403e651b07f56eb9b375c30ebf901ec05630307bd21661bba7c869db4322de95680e5b467988c1b2c6", 0x60}, {&(0x7f0000004fc0)="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", 0x1000}, {&(0x7f0000005fc0)="a8d64ce29bdc0672f062bf2b4c0207351aa2423eb09e13038d95fe0ebe19f46d84649abce92ce89428fdea753c833abd70600e703d52526042708bd462492579f43702933bdbf412b0f3d373f8694ffb109bdc583a2d1ef6eb9a73f45339e620794bdf3e9fd5f3a8e5d60232ca87b9a1fb0b98462bbf97dc76eb9e8e434b9edbd3fd6b93ea4c74222fb486138576e20a18e062867f3bd48563fce62b5456cb8415c6768555f016dad6d169df38019b0904beb046580d3353f68ecc1a6239327911e47874569a7eda96f3dcef8a077de3129bd0820e5dccd9bddf5595c21d74e08216eb59b051fef63807a041c575a0b86da574bba5c99c48", 0xf8}], 0x5, &(0x7f0000006140)=[@op={0x18}], 0x18}, {0x0, 0x0, &(0x7f00000075c0)=[{&(0x7f0000006180)="62f399e007c2601d4ca3419727f0eb32a8f882ccd0409fe8a93f462f8f2a8d7bf12d782d387362834acaa48f46d5db8a97a5db508b2ef53820e172815bf2b7d964ee122a9b819d3bc248473663c8bf810fee9ff552578bd12aa72dc4d97e94c586078392970398ec220df2a5fad5509b41413737356a3a59cb064e01756e2ef80fef", 0x82}, {&(0x7f0000006240)="5a513a92734cbd4c5a8dcbca3791277e3dd35d120ccb820073384a9c4a3134a1d99a2892f3fe9c74950014f1bc2ff8a60bc6c1b0cef4ebdb5a6bad1546947a9faaa2803d197f32bcf436533ae2568aeb47df5109b7ce16251c7d20c1227894b9521c0555961d247792dcdbc2fe84528d3dca17dd39b660db5231de22b5431326454e98dcd70439fa43092e65", 0x8c}, {&(0x7f0000006300)="077ba941ffbc650b9d5fadf5d6340b019e4323efceca7aea6ad57e56893a7157cf47af8d53e3f7dab4ab0e9f594dcb4c87c858d74402531e0c119d729dae25dad53d5743336a1e9319fea4c5f400515e219e5a920745496f038a1da7c8139d82a1561d8c5aa6728c61", 0x69}, {&(0x7f0000006380)="2f6a3f22ac71ee74173b665d72b2c080595260424deea476b387aa4f50873581dd7a2a649a76a6235923a8a8da3aa1564187e5a528f4128148", 0x39}, {&(0x7f00000063c0)="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", 0x1000}, {&(0x7f00000073c0)="3c02e14a3b148072754452373c0f2641114690042f38351e2c3fb383cabb8141fa0789adb80c359109cfa260e81507c74a19a32049eb4f36b6e92edf97e8", 0x3e}, {&(0x7f0000007400)="0754fbb6b0485c6393bcd883e525489a0fcc547c974dad737bb7627e4286d51e4336b784fba2e2c13c29ced3a37d67e36cc4331ca09ec109fa30c572a1bb9bbeee8b7b910190c65e943f55d167298ace0bd8441f85b37fa29456f8852742f904c19b145d9db1d754ae650a75", 0x6c}, {&(0x7f0000007480)="519a9a993877bbbe4cba39c9471593df490b8739c466743a0cf42eac2d22431b968f24cc8fae6fbf997d6b978fce036d16e2c78c9848e0e9e5f209041e9cfc64d89999d0a5d3c30e2d38d7ea", 0x4c}, {&(0x7f0000007500)="08f833ca6eb2b0d681195c81362614706d69d5a86150dc6d72af6ac9c6ade4e56a0b8ce20a51e16ea5708e1088eccacc2e275b7e1396edf8a6dad60e0cb305b7d3ffa0d52097efa3f1b3d1ce97714d98f5afafda21c75ea866fb1a381c0c2b87604999bcbe621430c4a545b4313bed01c15cda7e4bc9a1", 0x77}, {&(0x7f0000007580)="f0a82801f15630f3bde04222347905efe671ae9d9638a5498f249cf8f3a8", 0x1e}], 0xa, &(0x7f0000007d00)=ANY=[@ANYBLOB="e0000000000000001701000002000000c60000000325842780525037ed94d52158f8400d161e83fc1720c17394ea6cbe20f32aea8ca2a942f71cd985357f4d05a01dba23e179ea954d940b27a23dea682a3becfc44519988f69aa69dae558be4c9c38983e427b8730893a6b42188354d681847551079d9fd4a3f021c49abb111126dbe18b2b69df8fd3927cc0a211fe6cfa9294b56edd62baf58a94c2b63a92fd2ab1aaa5bf6b149f51fa5b8ad705d59d99dacc785d1cf0166d058fa9553fe76a42ff781e204255292e7475a6b4224bc052134d9a38bd4f791fa0000000000001800000000000000170100000400000003000000000000001800000000000000170100000400000008000000000000001800000000000000170100000300000001000000000000001800000000000000170100000400000094e4dd1000000000b4774e1bb27b364de69a192e4b286712e15af5202422f28edae303eb52509df5990b13529977c801a08e6df26ff73ca9d016744d991784f6b293811e2ea07dd497799da855ede34df972c4e17e221f78bed922190434c37b02383a306551d90a0369c1591f83e75d325c393eeb75c698f742c777270a8fff624c0d110c123f8ba7fcdb7b9fed9eabc50d7298a7eecaeb8d44fe1963dd15856f4816631eef0868aa54d85c559deabdcc5ab6bb226bc3a4660b8933d4b3fd3be0493218fb9cd254b19732f5f30d2a8e1180d820172ac7ceda016f5ae052b0d43f71e28fd30ee84764e9a6ffb31511bb878d22eaa2fa61547284bb"], 0x140, 0xc810}, {0x0, 0x0, &(0x7f0000007840)=[{&(0x7f00000077c0)="96fd11a5ad9e8adb4d", 0x9}, {&(0x7f0000007800)="1ab960f64dec4bc094f4d4", 0xb}], 0x2, &(0x7f0000007f40)=ANY=[@ANYBLOB="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"], 0x258, 0x24002000}], 0x9, 0x8000) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:32 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001000000800"/20, @ANYRES32=0x0, @ANYBLOB="0100f70080835c8e5aeab3dc5fa66c53"], 0x28}}, 0x1) 03:50:32 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0xfffffffc, 0x2, 'client1\x00', 0x5, "af030ace7128a30c", "8fa8e6ac6ae46994a81110280264bfafca15cd2589e6fd1ef866284c41438f7f", 0x2, 0x9}) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) socket(0x27, 0x4, 0xfff) 03:50:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce8"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x4, 0x9, 0x3f, 0x0, 0x5cf, 0x40400, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x41084, 0x1, 0x4, 0x6, 0x0, 0x81, 0xfffa}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) 03:50:33 executing program 5: r0 = socket(0x25, 0xa, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000001c0)=""/62) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000140)={0xa30000, 0x3000, 0x6, r1, 0x0, &(0x7f0000000100)={0x9909db, 0x3c533caa, [], @string=&(0x7f00000000c0)=0x5}}) ioctl$SOUND_MIXER_READ_RECMASK(r4, 0x80044dfd, &(0x7f0000000180)) ioctl$TUNSETIFINDEX(r1, 0x400454da, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000000)=""/181) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:50:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = socket$netlink(0x10, 0x3, 0x1e) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat(r4, &(0x7f00000005c0)='./file0\x00', 0x80, 0x10f) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=@gettaction={0x5c, 0x32, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@action_gd=@TCA_ACT_TAB={0x20, 0x1, [{0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0x10, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x60000000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x81}, 0x4ca518a81d50b4b0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00f4ff0f001fff0000000000000000006298bb1f179cd74df9000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800900010076657468000000000400028008000a00", @ANYRES32=r6, @ANYBLOB], 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'batadv_slave_1\x00', r6}) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getpeername$llc(r8, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001d0004002dbd7000ffdbdf250f000000", @ANYRES32=r7, @ANYBLOB="4000b0060a0001000180c200000000000a0002000000000000000000e59dfb6f034980e6d1f44d8c7590d483fab8fb1335260f9c8c954d65767fb1e6863a1f140778fca74578c0c285344bfc541704ccf7455f1460a43e4da27dad709ec004e43154f37da19e7d6d47335f5e3a10eab8aae9f6a5af3aca10ee8ad1f7a611235b9ce514f5c3b3eaf3648b33a20d3ae96faf9f0936c6422289759807807be9535ebe0dbcccc7e0bd79c320119afef16473df86db15aa83c14ca2dc495e7e6114657855b0486d"], 0x34}}, 0x0) 03:50:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="070180013a030000cf00000052010000a00000004ddfffff00000000000000007192ba1a657d6a4b07b2592138e0a1083806e5e9781041bb040f0966ed43a7a744f4040000007d5c8bc1b4a9a397aa00100000af856f969d3c5b1c8c91bb3d702670f910fc84553ab7fb1bad9f7afc1b2e80b6a09c7781733c57c3993eccdaf5ce2d1c67d4c426b7dde29f912b2d902cae2b129aa1d3cccd12f7c17b4b71b5aaaccd50c3efc98b4948b6a17cb0032031d65c6b927be7b191a9afc6fcd59609ce9f32ebb572d6558c7a83f197f9d1d75072e13deb8676827e883ab009562a3facf49a40a972"], 0xee) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000140)='./file0/file0\x00', 0x1000000000000003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x104000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0xa0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0)={r6}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={r6, 0x8}, 0x8) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) open_tree(r8, &(0x7f0000000040)='./file0/file0\x00', 0x81100) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:34 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 03:50:34 executing program 5: socket(0x22, 0x2, 0x2) r0 = socket(0x22, 0x2, 0xfffff000) getpeername$inet(r0, 0x0, 0x0) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, 0x0) [ 601.132553][ T27] kauditd_printk_skb: 14 callbacks suppressed [ 601.132567][ T27] audit: type=1800 audit(1584762634.389:899): pid=18418 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17831 res=0 03:50:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x1, {0x1, 0x2, 0x1}}, 0x14) r2 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) 03:50:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200800, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x4, 0x0, 0x10000, 0xc5a}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x6, r2, 0x0, 0x1}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 601.299845][ T27] audit: type=1804 audit(1584762634.419:900): pid=18424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/297/file0" dev="sda1" ino=17831 res=1 03:50:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="73656375726974792e0034f16f2ad7cded228f1691290455d298841649676d56f081ae0e25acbb343e3a98b95174352c3e582e23268624f2ccdd7fa6e327b9d7d1b9f1300405eea97173c9af07b8214fcb46f269d382b24dd30326c68412226295b83cace30b0ab4c7297c9b1df1a44057a3e1662d670868474f6e578a912250bfdc8098c23c6ec68b1e127f"], &(0x7f0000000580)=""/4096, 0x1000) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x104) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 601.781712][ T27] audit: type=1800 audit(1584762635.029:901): pid=18441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=151 res=0 [ 601.875961][ T27] audit: type=1804 audit(1584762635.049:902): pid=18441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/298/file0/file0" dev="loop3" ino=151 res=1 [ 605.549429][T18449] IPVS: ftp: loaded support on port[0] = 21 [ 605.708624][T18449] chnl_net:caif_netlink_parms(): no params data found [ 606.017422][T18449] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.024799][T18449] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.032905][T18449] device bridge_slave_0 entered promiscuous mode [ 606.044547][T18449] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.051648][T18449] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.059961][T18449] device bridge_slave_1 entered promiscuous mode [ 606.084304][T18449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 606.098308][T18449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 606.127612][T18449] team0: Port device team_slave_0 added [ 606.137717][T18449] team0: Port device team_slave_1 added [ 606.161388][T18449] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 606.168438][T18449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 606.195744][T18449] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 606.208884][T18449] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 606.216232][T18449] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 606.242596][T18449] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 606.306253][T18449] device hsr_slave_0 entered promiscuous mode [ 606.353167][T18449] device hsr_slave_1 entered promiscuous mode [ 606.392322][T18449] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 606.399909][T18449] Cannot create hsr debugfs directory [ 608.183275][T18449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 608.444481][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.453101][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.467621][T18449] 8021q: adding VLAN 0 to HW filter on device team0 [ 608.479656][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.489120][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.497713][T11000] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.504813][T11000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.512622][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 608.528947][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.537554][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.547156][T11000] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.554367][T11000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.570692][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 608.585431][T10794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 608.612117][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 608.621449][T11000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 608.632879][T10794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 608.640915][T10794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 608.649942][T10794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 608.665185][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 608.676541][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 608.690821][T10794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 608.700114][T10794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 608.716372][T18449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 608.810557][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 608.826752][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 608.882989][T18449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 608.890605][ T166] tipc: TX() has been purged, node left! [ 608.896851][ T166] tipc: TX() has been purged, node left! [ 609.002615][ T166] tipc: TX() has been purged, node left! [ 610.804986][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 610.817002][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 610.846468][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 610.855368][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 610.864438][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 610.872126][ T3263] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 610.884362][T18449] device veth0_vlan entered promiscuous mode [ 610.900831][T18449] device veth1_vlan entered promiscuous mode [ 610.936669][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 610.946439][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 610.954710][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 610.963944][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.977319][T18449] device veth0_macvtap entered promiscuous mode [ 610.989986][T18449] device veth1_macvtap entered promiscuous mode [ 611.020164][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.030824][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.041041][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.051928][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.061775][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.072582][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.082628][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.093426][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.103304][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.113786][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.123655][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.134210][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.144071][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.155333][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.165221][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 611.175693][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.187565][T18449] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 611.195599][T18447] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 611.205344][T18447] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 611.213524][T18447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 611.221968][T18447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 611.234157][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.246503][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.256860][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.267343][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.277172][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.287654][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.297927][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.308449][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.318305][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.328758][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.338613][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.349209][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.359749][T18449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 611.370521][T18449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 611.382086][T18449] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 611.390055][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 611.399753][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 611.663443][ T27] audit: type=1800 audit(1584762644.919:903): pid=18522 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=152 res=0 03:50:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce8"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x15, 0x2a}, {0x3, 0x7f}]}, 0x14, 0x1) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="3400000010000000000000c0553ddc07ee13edbf429e00000cd11627000000fa88d59901dd3460c63d797b84fd868165bee3bb2995aa26508099884388e5afb8cd9d57d79f2bc75edcd7d1c9a731379a1438f3946ea6d84ffb4d0ba0bd924d429636d4053ed2360ff46a8ff4c4efd56073e54b45760beb010ff7cfa74703d82134a8e2e44e67f0396d5ddd88f93d79ea2d936b21e48a7c43e506c7aaae732f685e13101a82c47fafda87d112b4db056612a200513393dbe534ca16c7f98e8e9cbb632899762850df9db567361121e0ced864ef267f21f0dd6e83e02effe8efe41fa6fa00a527b8d2efd400", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000100)={0x8ce5, 0x1, [0x1, 0x9, 0x200, 0x3, 0x1], 0xfec}) 03:50:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:45 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x9, r3, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) 03:50:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x5d1080, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)={{r4}, 0x8, 0x10001, 0x1}) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000040)) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x207fffffa7) 03:50:45 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0xffffffffffff4027, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000040)={r3, 0x200}) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 611.696601][ T27] audit: type=1804 audit(1584762644.939:904): pid=18522 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/0/file0/file0" dev="loop0" ino=152 res=1 [ 611.846580][ T27] audit: type=1800 audit(1584762645.099:905): pid=18533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16897 res=0 03:50:45 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = fcntl$dupfd(r3, 0x406, r4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000040)={0xfffffffffffffff8, 0xfffffffffffff000, 0x20}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x80}}, 0x18) r7 = dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r7, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x140c, 0x400, 0x70bd28, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4400c891}, 0x1) 03:50:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="343cf60051b00023e99c52b677c84ff4052b2e6d1c5e0f73bd2b2085542448ac7c940b1b527006d411fe447ab69ec4369be17a3055825bf27ec000458d7aa80d9f6679276171713c6294fb4ea93c94b11063ca501571f0f550370dcc93a662117af8c35478ba636a6533dc9d2ec1a4535349f6bc1e4828db3c5d5661df60d4ed5629f9db71b50724bf3b0f95f3368df916926fe71cf1a422048b417e843ff40aad9645557799cd87767a13bddef9f61aabbc2b6a885e24ebf11a6930b3644309c600b2a6431e94087da00d624395018cb554351a1df3b6928542f0781fe58b53ec7e6910a9b2a4430c7ede493a5cb4cdc48cb3957a38c323af5d33b7150fbd9c81e803cf", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x16800) 03:50:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x141500, 0xc8) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x640002, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 612.122605][ T27] audit: type=1804 audit(1584762645.099:906): pid=18533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/32/file0" dev="sda1" ino=16897 res=1 03:50:45 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x140, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85001000500000007b0a00ff00"/24], &(0x7f0000000000)='GPL\x00', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='\x00', r4}, 0x10) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000040)=r4) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:50:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 612.372508][ T27] audit: type=1800 audit(1584762645.299:907): pid=18543 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=153 res=0 [ 612.536093][ T27] audit: type=1804 audit(1584762645.309:908): pid=18543 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/1/file0/file0" dev="loop0" ino=153 res=1 [ 612.564870][ T27] audit: type=1800 audit(1584762645.309:909): pid=18549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16833 res=0 [ 612.606775][ T27] audit: type=1804 audit(1584762645.309:910): pid=18549 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/33/file0" dev="sda1" ino=16833 res=1 03:50:45 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) r3 = socket(0x22, 0x2, 0x2) getpeername$inet(r3, 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x80) 03:50:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB='S\a{\x00'], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 612.635311][ T27] audit: type=1800 audit(1584762645.709:911): pid=18562 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16786 res=0 [ 612.659451][ T27] audit: type=1804 audit(1584762645.749:912): pid=18562 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/34/file0" dev="sda1" ino=16786 res=1 03:50:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='.\x00', &(0x7f00000001c0)='9p\x00', 0x9, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@noextend='noextend'}, {@uname={'uname', 0x3d, 'self)trusted@user/,('}}, {@cache_loose='cache=loose'}, {@access_user='access=user'}], [{@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}, {@hash='hash'}, {@audit='audit'}]}}) 03:50:46 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @aes256, 0x0, [], "56e5d0fced94d1aece8b21af1aedf8e7"}) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 613.231192][T18588] 9pnet: p9_fd_create_tcp (18588): problem connecting socket to 127.0.0.1 03:50:47 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 03:50:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:47 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x198) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r5, r4, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x101000, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r6, 0x541c, &(0x7f0000000080)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x40580, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r3, r7, 0x0, 0x8) 03:50:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x4, &(0x7f00000001c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}, {&(0x7f0000000040)="ff844b997c371245", 0x8, 0x2}, {&(0x7f0000000580)="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", 0x1000, 0x2}, {&(0x7f0000000140)="5dd41efd36f6726f10868536374a0ebe72a69bb5c13753668fa7ae51e7", 0x1d, 0x5}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="000129bd7000ffdbdf25060000000800040000000000080004000300000006000b000100000008000c0002000000080002000300000008000700ac1e010106000b001f00000008000800ac1414bb"], 0x3}, 0x1, 0x0, 0x0, 0x801}, 0x40800) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r3, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @remote}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x38}}, 0x796217788eb683f7) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="340000001000"/20, @ANYRES32=0x0, @ANYRESOCT=r1], 0x3}}, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f0000000100)=0x5) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r6 = getpgid(0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000300)={0x2, 0x4e22, @empty}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x180, 0x39, 0x0, 0x0, 0x3}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r5, 0x5, &(0x7f0000000140)={0x0, 0x1, 0x4, 0xfffffffffffffffc, r6}) 03:50:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB='S\a{\x00'], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 614.295608][T18606] FAT-fs (loop3): invalid media value (0x72) 03:50:47 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@loopback, @initdev}, &(0x7f0000000080)=0xc) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) 03:50:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 614.393019][T18606] FAT-fs (loop3): Can't find a valid FAT filesystem [ 614.535115][T18606] FAT-fs (loop3): invalid media value (0x72) [ 614.562372][T18606] FAT-fs (loop3): Can't find a valid FAT filesystem 03:50:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0xfffd, 0x0, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x4) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/partitions\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)=@v2={0x2, @aes256, 0x2, [], "e860655a80a6398a2c9d90c0e0b55c60"}) ioctl$VT_DISALLOCATE(r5, 0x5608) dup3(r3, r2, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$TCSETSW2(r6, 0x402c542c, &(0x7f0000000140)={0x8, 0x8, 0x1, 0x8b1, 0xff, "587aaf24d6b09d2299257e9fdc14b42cf17bd5", 0x6c1, 0x3}) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 614.841122][T18642] FAT-fs (loop3): bogus number of reserved sectors [ 614.847903][T18642] FAT-fs (loop3): Can't find a valid FAT filesystem 03:50:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@ipv4_getroute={0x1c, 0x1a, 0x400, 0x70bd26, 0x25dfdbfe, {0x2, 0x10, 0x80, 0x8, 0xfc, 0x2, 0xc8, 0x5}, ["", "", ""]}, 0x1c}}, 0x0) 03:50:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8001ff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x2, 0x5, 0x4, 0x200000, 0x6, {0x77359400}, {0x4, 0x0, 0x7f, 0x2, 0x10, 0x5, "4ed50834"}, 0x3a, 0x0, @planes=&(0x7f0000000040)={0x9, 0xeaee, @fd=r3, 0x6}, 0x7fffffff, 0x0, r1}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r4, 0x9208, &(0x7f00000000c0)={0x0, 0xc3df63a0c4296581}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="3400000010e00000000000000000000000ea0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) 03:50:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 615.638876][T18648] FAT-fs (loop3): bogus number of reserved sectors [ 615.673483][T18648] FAT-fs (loop3): Can't find a valid FAT filesystem 03:50:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:49 executing program 1: r0 = open(0x0, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x5) 03:50:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB='S\a{\x00'], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x208000, 0x0) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000000240)=""/194) openat$ppp(0xffffffffffffff9c, 0x0, 0x480480, 0x0) dup3(r2, r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1c000, 0x0) ioctl$RTC_UIE_OFF(r6, 0x7004) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) getuid() r7 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) getsockopt$IP_SET_OP_GET_BYINDEX(r7, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x3}, &(0x7f00000001c0)=0x28) 03:50:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r3, 0x0, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4004055}, 0x2010) getpeername(r0, &(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video2\x00', 0x2, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000100766578680000000004000280ab04b4ba", @ANYRES32=r7, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000005200000128bd7000fddbdf250a08000100", @ANYRES32=r7, @ANYBLOB='\t\x00'/11], 0x24}}, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000040)) [ 616.203026][T18692] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 616.267620][T18692] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 03:50:49 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x90, "f392ceeef64c3046c19adbfab7e2b554a5ae292296583bc7b494025b50f106d1407a480a62eb32e8518213ecb54162bd3920cb4a0a78bad68a043a1ff28135ee46557587f8f84b8ffbed8959f8b534ff221a25a7713e1127ebc81fd71991ecd977d977a8ee3e498e45515257cf93cfa41930241f21c04e7014a69a1ba764d5d677c25bb274d3b08cc4dd1ff77b4a6b58"}, &(0x7f0000000140)=0xb4) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:50:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000008000000000010000000000edffffff944370f2ec6dcb17c84bc9ea694b2674b3941b66e42416b82b37d0f08ea50cb7687200089a53ba872eeda948bd14aeebcebd5580466aa8a90b71a0f8a341d9482f3a9bb2ce0a773a7058886695fefd5f084a5789b206ac3d88cd58cbe95d8110c0cbacdbd40e9677f983fefa1419101a1de83001b56cdae3fccb047855e969c9668f055364a9f583ed7b8cffbeaef097f3281dae636d2a719d05c29507e83f1cdec71e9301ced9f1b3376215584ccbcb777ae4c9a9907bb1c01ab2588e28986959bcb05fb5f58981ee291f3fd194", @ANYRES32=0x0, @ANYBLOB="00000000000000001400128009000100626f6e640000000004000280"], 0x34}}, 0x0) socket$alg(0x26, 0x5, 0x0) 03:50:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 616.692447][ T27] kauditd_printk_skb: 26 callbacks suppressed [ 616.692461][ T27] audit: type=1804 audit(1584762649.949:939): pid=18714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/39/file0" dev="sda1" ino=17009 res=1 03:50:50 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b000c0f00fe078bc3670c87594d0063dac37b000000000000", 0x23}], 0x1}, 0x0) 03:50:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbd"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 616.919769][ T27] audit: type=1800 audit(1584762650.059:940): pid=18718 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=158 res=0 [ 616.972480][ T27] audit: type=1804 audit(1584762650.059:941): pid=18718 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/8/file0/file0" dev="loop0" ino=158 res=1 03:50:50 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x8a852f6e9cffff8a, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000140)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101300, 0x0) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r4, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 617.050298][ T27] audit: type=1800 audit(1584762650.169:942): pid=18724 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=159 res=0 03:50:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 617.133466][ T27] audit: type=1804 audit(1584762650.229:943): pid=18724 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/305/file0/file0" dev="loop3" ino=159 res=1 03:50:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x80, 0xa) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0xc016, 0x0, 0x4}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:50 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0/../file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000001c0)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = dup3(r2, r1, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = accept$inet(r3, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x240a00, 0x0) sendfile(r5, r6, 0x0, 0x200007fffffaa) [ 617.289774][ T27] audit: type=1800 audit(1584762650.369:944): pid=18733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17009 res=0 [ 617.583543][ T27] audit: type=1800 audit(1584762650.839:945): pid=18752 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=160 res=0 [ 617.620041][ T27] audit: type=1804 audit(1584762650.869:946): pid=18752 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/306/file0/file0" dev="loop3" ino=160 res=1 [ 617.834099][ T27] audit: type=1800 audit(1584762650.869:947): pid=18750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=161 res=0 03:50:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 617.952846][ T27] audit: type=1804 audit(1584762650.879:948): pid=18758 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/9/file0/file0" dev="loop0" ino=161 res=1 03:50:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbd"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:51 executing program 2: 03:50:51 executing program 2: 03:50:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r3}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r5, 0x105, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x7d0, @media='udp\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r5, 0x10, 0x70bd24, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x2}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040805}, 0x44001) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r7, r1, 0x0) sendfile(r1, r6, 0x0, 0x7fffffa7) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x2005c2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r8, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000300)=0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/39) 03:50:51 executing program 1: migrate_pages(0x0, 0x6, &(0x7f0000000000)=0x7fffffff, &(0x7f0000001ac0)=0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/fscreate\x00') getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000180)) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = clone3(&(0x7f0000001680)={0x8000000, 0x0, 0x0, 0x0, {0x3f}, 0x0, 0x0, 0x0, 0x0}, 0x50) migrate_pages(r2, 0x6, &(0x7f0000000000)=0x7fffffff, &(0x7f0000001ac0)=0x2) r3 = syz_open_procfs(r2, &(0x7f0000000080)='attr/fscreate\x00') getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000180)) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)={{0xffffffffffffffff, 0x0, r4, 0x0, r1, 0x0, 0x3}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x10000000000, 0x5}) msgsnd(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0300000000000000e8fa48a3aa9707e5e6f3e4495d0883730924412ad90e810000000000000071bad3b9dd347344d839b238573a1b82542714e68aad5fca525c39296c8ca38a1d8f88ff410c842dec864761a932b9ed4c58b56afe64e1f5092f506c26270d12ff43219a7a4abe33cb95041e2fee81c977e2642ef077d02d99162fcb3c7109409cad4c9fd6f0c78350a03a76f7fb36344ee51847ddea73447fdd1138718ed6e5967a0100000016c56b7691d839"], 0xb3, 0x800) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/210) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r5 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x0) ioctl$BLKTRACESTOP(r7, 0x1275, 0x0) sendfile(r5, r6, 0x0, 0x7fffffa7) 03:50:51 executing program 2: [ 618.695994][T18785] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:52 executing program 2: 03:50:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x810}, 0x4000010) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0500000000000000000001000000040004000500050009000000050006000000000008000300970d00007d695d6c8712fd67745ecbaa20c64389f85d0d9cd5c97633075de0ce069b8d06d323b70527f6"], 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x88020028}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002cbd7000fbdbdf25010000000500060009000000000000000000000000000000050005000100020005000600080000000400040018000400080000000000200cb785a1cdd63d4cf48e9c34ef0008000000620a000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r6, r5, 0x0, 0x200000007fffffa7) 03:50:52 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000140)={0x1, 0x1, 0x1}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x14, r4, 0xdaa3b002485c5b6d, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x1a0, r4, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x74, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xa4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x20, @dev={0xfe, 0x80, [], 0x3c}, 0x7f}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1ff, @mcast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x46e7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffc01}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2000}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}]}, @TIPC_NLA_LINK={0x54, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8ca3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_NET={0x4}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4090) 03:50:52 executing program 2: 03:50:52 executing program 2: 03:50:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbd"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:52 executing program 2: [ 619.659754][T18824] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 03:50:52 executing program 2: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x2080, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') close(r0) 03:50:53 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000000)={0x400, 0xffffffff}) 03:50:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0xfffffd, 0x0, &(0x7f0000000000), 0x1000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r2, r1, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8) 03:50:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0xa4}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 620.645768][T18810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = io_uring_setup(0xa37, &(0x7f00000001c0)={0x0, 0x0, 0x9, 0x1, 0x33b}) flistxattr(r4, &(0x7f0000000040)=""/29, 0x1d) 03:50:54 executing program 1: rt_sigaction(0x24, &(0x7f0000000280)={&(0x7f00000001c0)="c441fb1245fb0f1c4a0cf244af420fe017262e0f380b4e06660febbf7ef1b22bf2400f446b31f0478041abccc4a2158c5da5d9ec", 0x5, &(0x7f0000000200)="47a7c403515ea9efa6cf0eb0440fb3bd00000000f326438e830100000066450f382b40008f6978c688d9000000c443092014660ac4a23dbe9a37fe0000f30fc7fbc44279304bf2", {[0x1]}}, &(0x7f0000000380)={&(0x7f00000002c0)="67470fdc9300100000c4c17fe61345dbb843850000c421255ec467363e0f380579f7f26e420f62e43e660f3a223929c4c2192eaa39000000c4e16df47a25", 0x0, &(0x7f0000000300)="c46289a86300c442791c3fc401275f434d3e44d0af00000000c4a25bf5aca19d540000660f5d9300000000c4229528b100100000c4617a11f7410f1498b4950000f00fb3b6fb38f2c8"}, 0x8, &(0x7f00000003c0)) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xf932) r1 = shmget(0x0, 0x1000, 0x780012c9, &(0x7f0000ffa000/0x1000)=nil) r2 = getpgid(0x0) truncate(&(0x7f0000000140)='./file0\x00', 0x400) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getscheduler(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCCBRK(r4, 0x5428) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/133) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xd, &(0x7f0000000400)=""/210, &(0x7f0000000500)=0xd2) 03:50:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/pid_for_children\x00') 03:50:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:54 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) dup3(r2, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 621.191719][T18883] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000038c0)="2e0000001c008104e00f80ec9fcb0930020000040e000000980040fb12000100040fda1b400500000fa3e70b05bb", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 03:50:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$tty20(0xc, 0x4, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCL_GETMOUSEREPORTING(r7, 0x541c, &(0x7f0000000140)) r8 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x3f, 0x9c22ca0ff220598b) write$6lowpan_control(r8, &(0x7f00000001c0)='connect aa:aa:aa:aa:aa:11 2', 0x1b) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000240)={0x800, 0x8, 0x4, 0x402010, 0x568, {0x0, 0x2710}, {0x2, 0x0, 0x0, 0xd3, 0x7, 0x5, "dbdb225f"}, 0x41, 0x2, @offset=0xa0000002, 0x9691, 0x0, r4}) 03:50:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:55 executing program 1: r0 = open(0x0, 0x0, 0x90) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x80) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/timer_list\x00', 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) memfd_create(&(0x7f00000004c0)='\x88])+\x00', 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r3, 0x0) futex(0x0, 0x1, 0xfffffffe, &(0x7f0000000080)={0x77359400}, 0x0, 0x2) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r5, 0x54a2) sendfile(r1, r2, 0x0, 0x7fffffa7) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x248000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f00000001c0)=0x40, 0x4) socket$xdp(0x2c, 0x3, 0x0) [ 621.702802][ T27] kauditd_printk_skb: 28 callbacks suppressed [ 621.702816][ T27] audit: type=1800 audit(1584762654.949:977): pid=18905 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=167 res=0 03:50:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 621.882744][ T27] audit: type=1804 audit(1584762654.959:978): pid=18905 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/14/file0/file0" dev="loop0" ino=167 res=1 [ 621.882773][ T27] audit: type=1800 audit(1584762655.119:979): pid=18903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17665 res=0 [ 621.889407][ T27] audit: type=1800 audit(1584762655.139:980): pid=18909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16550 res=0 [ 621.905769][ T27] audit: type=1804 audit(1584762655.159:981): pid=18909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/47/file0" dev="sda1" ino=16550 res=1 [ 621.995349][ T27] audit: type=1400 audit(1584762655.249:982): avc: denied { map } for pid=18908 comm="syz-executor.1" path="pipe:[70593]" dev="pipefs" ino=70593 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 [ 622.240224][ T27] audit: type=1800 audit(1584762655.469:983): pid=18918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=168 res=0 [ 622.270066][ T27] audit: type=1804 audit(1584762655.499:984): pid=18918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/15/file0/file0" dev="loop0" ino=168 res=1 03:50:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 622.805276][ T27] audit: type=1800 audit(1584762656.059:985): pid=18932 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=169 res=0 03:50:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x1, 0x20, 0xbc, 0x8, 0x0, 0x4, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5182, 0x2, @perf_config_ext={0x0, 0x7a}, 0x20a0, 0x7, 0x80000001, 0x9, 0x401, 0x2, 0xfffc}, r4, 0x5, r3, 0x9) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:50:56 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 622.992964][ T27] audit: type=1804 audit(1584762656.089:986): pid=18932 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/16/file0/file0" dev="loop0" ino=169 res=1 03:50:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:56 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x240c2, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r4}, 0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={r4, 0x2, 0xfffffff9}, &(0x7f0000000040)=0x10) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r6, r5, 0x0) sendfile(r0, r5, 0x0, 0x7fffffa7) 03:50:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:56 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x8) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:50:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:57 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x140f, 0x10, 0x70bd2c, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'srp\x00'}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x40814) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101800, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000240)=""/69) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r5, 0x80585414, &(0x7f00000001c0)) 03:50:57 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c2b) [ 624.081619][ T2952] aoe: packet could not be sent on ipvlan1. consider increasing tx_queue_len 03:50:57 executing program 1: open(0x0, 0x610400, 0x1b0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:50:57 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x111200, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000340)={0x2, 'veth0_to_hsr\x00', {0x80000001}}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:50:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800800", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x11cac0, 0x139) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) fadvise64(r3, 0x9, 0x3c, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r4, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800800", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:50:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) accept(r1, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000040)=0x80) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) r3 = socket(0x22, 0x2, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@ipv6_newroute={0x150, 0x18, 0x0, 0x70bd2c, 0x25dfdbfd, {0xa, 0x10, 0x0, 0xfb, 0x0, 0x0, 0xc8, 0x2, 0x800}, [@RTA_EXPIRES={0x8, 0x17, 0x1ff}, @RTA_PREF={0x5, 0x14, 0x9}, @RTA_EXPIRES={0x8, 0x17, 0xffff439c}, @RTA_MARK={0x8, 0x10, 0x5}, @RTA_PREF={0x5, 0x14, 0x9}, @RTA_METRICS={0xe1, 0x8, 0x0, 0x1, "59896ef028beba8dec8aef87b7d8cb5cd805f59f7ad22fceb1d85e42dddce49f3047d6e31ec89e7332640a023dc74344174ad9c383da87857d37e3044f5dc46bab7c37599374a35d51f47934cf21972a98b2c48a0ca80c98633bec001ca4cb46eeed0aced7459f3a3ba16ed0acad4e55a191e5dfdbe023792c5bf4f3421bf9eb4e454e01a9aee7b4bbfbeacc9c629fdaaf0c205ce9a78baf279a5b425a91ea69fcd8852e8fcca4cdb415db34940e78bbfdd5489b9d44d011312457f76b7585be20e7a494f50d94f29654a712a17ff1bbc0c91ecc2201c8bcc409cfa2e7"}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @typed={0xc, 0x8d, 0x0, 0x0, @u64=0xffffffffffffff2f}}, @RTA_UID={0x8, 0x19, r5}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_PREF={0x5, 0x14, 0x1}]}, 0x150}, 0x1, 0x0, 0x0, 0x9810}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, r7, 0x1, 0x0, 0x0, {0x6}, [@L2TP_ATTR_IFNAME={0x14}]}, 0x28}}, 0x0) r8 = socket(0x22, 0x2, 0x2) getpeername$inet(r8, 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r7, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000001}, 0x8004) getpeername$inet(r3, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000140)={0xb7, {{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x3d}, 0x3f}}}, 0x88) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:50:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800800", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:50:59 executing program 5: socket(0x27, 0x2, 0x89) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) r1 = socket(0x27, 0x5, 0xdc) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r4, 0xc00464b4, &(0x7f00000000c0)) keyctl$read(0xb, r2, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r5, 0x500e, 0x0) mmap$dsp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x110, r5, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) getsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000400), &(0x7f0000000440)=0x4) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x280000, &(0x7f0000000240)=ANY=[@ANYBLOB='mode=00000000000000000000401,mode=00000000000000000000125,mode=00000000000000000100000,mode=00000000000000000000007,mode=00000000000000000000004,context=system_u,euid>', @ANYRESDEC=r6, @ANYBLOB="2c61756469742c6f626a5f757365723d5e29776c616e30776c616e302c6f626a5f208f14d83d657468316370757365742c00"]) keyctl$describe(0x6, r2, &(0x7f0000000000)=""/174, 0xae) [ 626.597920][T19062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=19062 comm=syz-executor.1 [ 626.726493][ T27] kauditd_printk_skb: 38 callbacks suppressed [ 626.726508][ T27] audit: type=1804 audit(1584762659.979:1025): pid=19065 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir239122750/syzkaller.wO0fIj/164/file0/file0" dev="loop2" ino=176 res=1 [ 626.812589][T19068] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=19068 comm=syz-executor.1 03:51:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:00 executing program 1: open(0x0, 0x200080, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x1c2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RFSYNC(r2, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffa7) [ 627.019553][T19065] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 627.037312][ T27] audit: type=1400 audit(1584762660.019:1026): avc: denied { getattr } for pid=19056 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:51:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 627.192782][ T27] audit: type=1800 audit(1584762660.069:1027): pid=19073 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=177 res=0 03:51:00 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(r0, 0x8) r1 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1400001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x40, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e984751}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf1fa622}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe5c3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe7a7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf4d2}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d23b6d1}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}]}, 0x84}, 0x1, 0x0, 0x0, 0xc800}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0xfb, 0x1, 0x81, 0x0, 0x5770, 0x10000, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0x71b}, 0x800, 0x6, 0x4, 0x3, 0x5e6, 0x81, 0xba}, 0xffffffffffffffff, 0x6, r4, 0x0) 03:51:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbd"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:00 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x18, &(0x7f0000000000)={0x4, 0x3ff, 0x459}, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000080)={0x80000001, 0x0, 0x3, 0x6, 0x0, "717a4572e0c646f77945a2c473d89809a4dc1a", 0x5, 0x80000001}) [ 627.451310][ T27] audit: type=1804 audit(1584762660.069:1028): pid=19073 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/22/file0/file0" dev="loop0" ino=177 res=1 [ 627.743512][ T27] audit: type=1800 audit(1584762660.419:1029): pid=19080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=178 res=0 03:51:01 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x608000, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000040)) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 627.951754][ T27] audit: type=1804 audit(1584762660.419:1030): pid=19080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/23/file0/file0" dev="loop0" ino=178 res=1 [ 628.098332][ T27] audit: type=1800 audit(1584762660.429:1031): pid=19086 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16544 res=0 03:51:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 628.255848][ T27] audit: type=1800 audit(1584762660.809:1032): pid=19103 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16568 res=0 03:51:01 executing program 5: r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000000)=""/169, 0xa9, 0x100, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket(0x22, 0x2, 0x2) r2 = socket(0x22, 0x2, 0x2) getpeername$inet(r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r4, 0xc0505405, &(0x7f0000000200)={{0x0, 0x3, 0xffffffff, 0x0, 0x8000}, 0x7, 0x4efb, 0x80000000}) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={0x0, @null, @netrom={'nr', 0x0}, 0x8001, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, 0x7, [@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @default, @bcast]}) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) [ 628.422355][ T27] audit: type=1800 audit(1584762660.819:1033): pid=19105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16569 res=0 03:51:01 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000000003010000000000000000000004000000000000000f000000000000006261746164765f736c6176655f300000"], 0x30) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2f41c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) getpeername$packet(r6, &(0x7f0000000080), &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000010001fff27bd70000000000000000000", @ANYRES16, @ANYBLOB="10080000c20000001400128000000100707070000000028000000100", @ANYRES32=r0, @ANYBLOB="00001f006ab4e4739d77432d000001800020018000000500ab12070f65feb897cc4c189199b457a4000005007ff9e0e42304b7f4f7f0c592cb2cdf08000001004fa800000000060008000000000002006261746164765f736c6176655f30000000000600c7000000a5fc04004a4de8ed2db34fb083e199962b39fe260000050000000000000000000000000000867100000004008c71efc5ce549a77cc6f058a4db9af1a000001002c41000000000180000005008acb56b834634faea3312035b3ce6e200000020070707000"], 0x5}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', r5}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) dup3(r7, r2, 0x80000) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 628.612704][ T27] audit: type=1804 audit(1584762660.829:1034): pid=19105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/24/file0" dev="sda1" ino=16569 res=1 03:51:01 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000040)={0x4}) 03:51:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80004, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000140)={0x0, @time={0x6, 0x8}, 0x8, {0x1}, 0x8, 0x2, 0xfe}) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x8002, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x400, 0x1ff, 0xfffffff8, 0x100, 0x5}, &(0x7f00000002c0)=0x14) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r7, r4, 0x0) sendfile(r1, r4, 0x0, 0x7fffffa7) 03:51:02 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x705ac0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$VIDIOC_QUERY_DV_TIMINGS(r10, 0x80845663, &(0x7f0000000280)={0x0, @reserved}) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:03 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000000)={0x3, 0x0, 0x5, @local, 'veth0_to_batadv\x00'}) 03:51:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x5e, 0x1, 0x29, "44bafa5a4ad2a18290dc03036e6dc0d3", "cc8fc89ca82b8534056c54cba4e84977c3210414270ca3febbec8e6ab6c57df25d9b304cb2b57d777fb5c038c78915f392769804c4724ef63acb34376270551303153d6e53bc76a684"}, 0x5e, 0x1) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="3dbfa687ba09c414a3e18280a66205e714f536360274dc350326f4c78c11f0da2da886ca3bf3b6c1d76876c664c867c0bf6d5983b5ddc84bfaa91ef3e306e9b7712bdb2d016de67e4c1213c0ac9278f0ee119b12af4725f97548f14d42bf52714f160f88b253e589800823a37f7604b101732e9cee7fce45697ab44016418f569d9c12c0ee27f726f28208182f0393d9f248c352be3b9bd7c002cb500f75bf6a5a51ac1db6c2754b30c6c2ad8026838e3fc623c0", 0xb4}, {&(0x7f0000000280)="62a536d3e8cd6104f182dc0d82810db492a602347a520fe7ebe06f3419de8e6270460e4748d455945b73b462149d0bb52837734eabb433f052014ca08da3e6862444c58217f100e5dc3477ffe00bbf27ac6f7341129965061ceaf0ba132b4daada1b09221bf742ee08b442cedd383aa18a4214770d3e72b49c97e1c54b1e54bb11702d9c7d757fe8e698569d63c5a2f8", 0x90}], 0x2, &(0x7f00000003c0)=[{0x50, 0x1fa, 0x3, "bdd5dfe5f3a99c036b15687aeb6fe6181d1c698580c7ed734c326406e6e05890fbd588f5d80b78ccf7a1372cf691e363fe5a091ab5f5db4b7fa252b35a3a69"}], 0x50}, 0x4000040) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:03 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) readahead(r0, 0x5, 0x9) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:03 executing program 5: r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) r1 = accept4$x25(r0, 0x0, &(0x7f0000000000), 0x80800) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000040)={0x4, 0x1}) r2 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) 03:51:03 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40180, 0x0) accept4$inet6(r3, 0x0, &(0x7f0000000080), 0x0) r4 = socket$rds(0x15, 0x5, 0x0) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) preadv(r5, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/40, 0x28}, {&(0x7f0000000200)=""/23, 0x17}, {&(0x7f0000000240)=""/2, 0x2}], 0x3, 0x1000000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000140)) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) dup3(r6, r4, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:03 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x321002, 0x0) dup3(r0, r1, 0x0) 03:51:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 630.735497][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 630.761311][ T166] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 630.834484][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 630.894898][ T166] batman_adv: batadv0: Removing interface: batadv_slave_1 03:51:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:04 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x10000, 0x20) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r3, r4, &(0x7f0000000040)=0x9, 0x9) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:04 executing program 5: r0 = socket(0x15, 0x2, 0x2) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) getpeername$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000040)) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x0, 0x0, 0x7) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r5, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvme-fabrics\x00', 0x102, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r8, 0x80845663, &(0x7f00000001c0)) [ 630.937061][ T166] device bridge_slave_1 left promiscuous mode [ 631.065863][ T166] bridge0: port 2(bridge_slave_1) entered disabled state 03:51:04 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) r2 = socket(0x22, 0x2, 0x2) getpeername$inet(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x7, @remote, 0x1}}, [0x2aaf, 0x5, 0xafe2, 0x0, 0x80, 0xffffffffffff8001, 0x0, 0x7, 0x3f, 0xe1, 0x2, 0x8, 0x7fff, 0x4e31, 0x3]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r3, 0x7fff, 0x8, 0x2, 0x2, 0x9}, &(0x7f0000000180)=0x14) [ 631.276094][ T166] device bridge_slave_0 left promiscuous mode [ 631.305367][ T166] bridge0: port 1(bridge_slave_0) entered disabled state 03:51:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 631.420635][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_0 03:51:04 executing program 1: r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, @default, @rose={'rose', 0x0}, 0x7, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 631.481030][ T166] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 631.547837][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 631.574276][ T166] batman_adv: batadv0: Removing interface: batadv_slave_1 03:51:04 executing program 5: r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 631.648592][ T166] device bridge_slave_1 left promiscuous mode [ 631.692985][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.734863][ T27] kauditd_printk_skb: 34 callbacks suppressed [ 631.734883][ T27] audit: type=1804 audit(1584762664.989:1069): pid=19266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/31/file0/file0" dev="loop0" ino=184 res=1 [ 631.837468][ T166] device bridge_slave_0 left promiscuous mode [ 631.876840][ T166] bridge0: port 1(bridge_slave_0) entered disabled state 03:51:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 631.947866][ T27] audit: type=1800 audit(1584762665.199:1070): pid=19272 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17845 res=0 03:51:05 executing program 5: r0 = socket(0x2, 0x4, 0xffffffe1) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) recvmsg$can_raw(r1, &(0x7f0000000740)={&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000080)=""/206, 0xce}, {&(0x7f0000000180)=""/146, 0x92}, {&(0x7f0000000240)=""/70, 0x46}, {&(0x7f00000002c0)=""/21, 0x15}, {&(0x7f0000000300)=""/101, 0x65}, {&(0x7f0000000380)=""/118, 0x76}, {&(0x7f0000000400)=""/5, 0x5}, {&(0x7f0000000440)=""/3, 0x3}, {&(0x7f0000000480)=""/208, 0xd0}], 0x9, &(0x7f0000000640)=""/254, 0xfe}, 0x62) 03:51:05 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open$dir(&(0x7f0000000000)='./file0\x00', 0x101004, 0x14) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 632.035225][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 632.053384][ T166] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 632.129516][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 632.209310][ T166] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 632.225296][ T27] audit: type=1800 audit(1584762665.479:1071): pid=19285 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=185 res=0 [ 632.302093][ T166] device bridge_slave_1 left promiscuous mode [ 632.331002][ T166] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.403584][ T27] audit: type=1804 audit(1584762665.479:1072): pid=19285 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/32/file0/file0" dev="loop0" ino=185 res=1 [ 632.443617][ T166] device bridge_slave_0 left promiscuous mode [ 632.454551][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.542291][ T27] audit: type=1800 audit(1584762665.699:1073): pid=19294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16587 res=0 [ 632.662655][ T27] audit: type=1804 audit(1584762665.699:1074): pid=19294 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/68/file0" dev="sda1" ino=16587 res=1 [ 632.691580][ T166] device veth1_macvtap left promiscuous mode [ 632.713223][ T166] device veth0_macvtap left promiscuous mode [ 632.719707][ T166] device veth1_vlan left promiscuous mode [ 632.727378][ T166] device veth0_vlan left promiscuous mode [ 632.884449][ T166] device veth1_macvtap left promiscuous mode [ 632.891069][ T166] device veth0_macvtap left promiscuous mode [ 632.897749][ T166] device veth1_vlan left promiscuous mode [ 632.903957][ T166] device veth0_vlan left promiscuous mode [ 633.053902][ T166] device veth1_macvtap left promiscuous mode [ 633.060320][ T166] device veth0_macvtap left promiscuous mode [ 633.066851][ T166] device veth1_vlan left promiscuous mode [ 633.074022][ T166] device veth0_vlan left promiscuous mode [ 636.834738][ T0] NOHZ: local_softirq_pending 08 [ 643.502707][ T166] device hsr_slave_0 left promiscuous mode [ 643.562686][ T166] device hsr_slave_1 left promiscuous mode [ 643.623568][ T166] team0 (unregistering): Port device team_slave_1 removed [ 643.636998][ T166] team0 (unregistering): Port device team_slave_0 removed [ 643.648257][ T166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 643.700360][ T166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 643.826245][ T166] bond0 (unregistering): Released all slaves [ 643.974400][ T166] bond0 (unregistering): (slave veth5): Releasing backup interface [ 644.027438][ T166] bond0 (unregistering): (slave veth3): Releasing backup interface [ 644.212952][ T166] device hsr_slave_0 left promiscuous mode [ 644.283164][ T166] device hsr_slave_1 left promiscuous mode [ 644.352794][ T166] team0 (unregistering): Port device team_slave_1 removed [ 644.366264][ T166] team0 (unregistering): Port device team_slave_0 removed [ 644.377484][ T166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 644.427197][ T166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 644.559741][ T166] bond0 (unregistering): Released all slaves [ 644.813537][ T166] device hsr_slave_0 left promiscuous mode [ 644.872386][ T166] device hsr_slave_1 left promiscuous mode [ 644.935177][ T166] team0 (unregistering): Port device team_slave_1 removed [ 644.947175][ T166] team0 (unregistering): Port device team_slave_0 removed [ 644.959973][ T166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 645.007032][ T166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 645.157848][ T166] bond0 (unregistering): Released all slaves 03:51:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:18 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000000)={0x2, 'veth0_virt_wifi\x00', {0x8}, 0x49a}) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:18 executing program 5: r0 = socket(0x26, 0x5, 0x5) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r5}, 0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000440)={r5, 0x9, 0xe8, 0x2}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000000)=""/249, &(0x7f0000000100)=0xf9) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r7}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r8, 0x208200) r9 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r8, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="4812d346245acc97a6b372c787742ab58bd59936d79564e86fcdf62685a995dad8d450e3b2bdb762ed096870b329aa8f4f522a37969199c2e72279fb8ba9d3caf305d6ffd64c9d0efd96493760899f293b4a0c41827b0c9259a08fba5ab8c4a1d9246e5d861936a4686253d274e8f6029a96e7724b2406294833e18c51ae1089a375e6f41c1250c3de8244f76f", @ANYRES16=r9, @ANYBLOB="000129bd7000ffdbdf25060000000800040000000000080004000300000006000b000100000008000c0002000000080002000300000008000700ac1e010106000b001f00c2de07e50800ac1414bb"], 0x3}, 0x1, 0x0, 0x0, 0x801}, 0x40800) sendmsg$NLBL_MGMT_C_LISTDEF(r6, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, r9, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @empty}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x88}, 0x1, 0x0, 0x0, 0x80d0}, 0x20000000) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) ioctl$TIOCGDEV(r7, 0x80045432, &(0x7f00000002c0)) 03:51:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000140)={r1, r2/1000+10000}, 0x10) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r7 = socket(0x22, 0x2, 0x2) getpeername$inet(r7, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r7, 0x10f, 0x86) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r6, r5, 0x0) sendfile(r4, r5, 0x0, 0x7fffffa7) 03:51:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:18 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0x3b64, 0x0) ioctl$VFIO_GET_API_VERSION(r4, 0x3b64) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffa7) [ 645.378606][ T27] audit: type=1800 audit(1584762678.629:1075): pid=19302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16576 res=0 [ 645.503726][ T27] audit: type=1804 audit(1584762678.629:1076): pid=19302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/69/file0" dev="sda1" ino=16576 res=1 [ 645.510535][T19317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19317 comm=syz-executor.5 [ 645.557327][ T27] audit: type=1800 audit(1584762678.699:1077): pid=19306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16563 res=0 03:51:18 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r5) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 645.615903][T19319] FAT-fs (loop3): bogus number of reserved sectors [ 645.649551][ T27] audit: type=1804 audit(1584762678.709:1078): pid=19306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/33/file0" dev="sda1" ino=16563 res=1 [ 645.679126][T19319] FAT-fs (loop3): Can't find a valid FAT filesystem [ 645.687729][ T27] audit: type=1800 audit(1584762678.789:1079): pid=19318 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16598 res=0 [ 645.716546][ T27] audit: type=1800 audit(1584762678.939:1080): pid=19325 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16595 res=0 03:51:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 645.781923][T19317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19317 comm=syz-executor.5 [ 645.828969][ T27] audit: type=1804 audit(1584762679.029:1081): pid=19325 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/320/file0/file0" dev="sda1" ino=16595 res=1 [ 645.867565][T19319] FAT-fs (loop3): bogus number of reserved sectors [ 645.907091][T19319] FAT-fs (loop3): Can't find a valid FAT filesystem [ 646.072649][ T27] audit: type=1800 audit(1584762679.149:1082): pid=19334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16532 res=0 03:51:19 executing program 1: open(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0x0, 0x3}, 0x10) fchdir(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) 03:51:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x140b, 0x4, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x5}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x1}]}, 0x38}}, 0x40) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 646.200496][ T27] audit: type=1804 audit(1584762679.149:1083): pid=19334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/71/file0" dev="sda1" ino=16532 res=1 03:51:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 646.374915][ T27] audit: type=1800 audit(1584762679.479:1084): pid=19347 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16522 res=0 03:51:19 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 03:51:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:20 executing program 1: open(0x0, 0x6c8041, 0x82) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@v1={0x2, "42c1"}, 0x3, 0x1) dup3(r2, r1, 0x0) r3 = socket(0x22, 0x2, 0x2) getpeername$inet(r3, 0x0, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendfile(r0, r1, 0x0, 0x7fffffa7) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000000)) 03:51:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x200001000000, 0x2, &(0x7f0000000080)=[{&(0x7f00000001c0)="028777308a2374460d31445cd59c288a9cfb9873c4933869cbe6092d55134e6341fd65541639da4060ad2fd01f77658883d8eb2d5556da2bf1197c4693da88461a5cad7e4b587de793e76b73e3a1ce0a2f1c86fb8acf93f35929a8a6c17c43c12449f50ce171dc371ad35752f843023d94a88ac78f18f986b2c33642c434f19641f4856f9507d3f8ff12468b5034d4d83580d1e381de1df77a4e463e341f3e5ab119f5dbc69426b73d59f3bbe531f531b250b56a0ef00dc2dfda67", 0xbb, 0x6}, {&(0x7f0000000480)="85cc12aaa45245d329195e93c07633413e74289c560520d2e915fb77904ab43e2ff8d57de9d75460dce001f57d0564fbabe46f0efc2633f0a728fb236530aaebf706c233522e554a5b7f85e66ccd7d252d045d6d6adfb93d58563837cb2b2779fedd3e5dbe0ec35d9b15854ec82601933d46049938c608f57600cac4ef6021260f52a160", 0x84, 0x9}], 0x988884, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f0000000440)={0x600, 0x2, &(0x7f0000000140)=[0x4, 0xfffffffc], &(0x7f0000000340)=[0x1, 0x10001, 0x3, 0xffffffff, 0x9, 0x401], &(0x7f00000003c0)=[0x0, 0x6, 0x8, 0x10, 0x0], &(0x7f0000000400)=[0x8bf5, 0x3, 0x80000001]}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) 03:51:20 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000000000800030003000000", 0x24) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000400)=0x1, 0x4) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x1}) setuid(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) ptrace$setregs(0xf, 0x0, 0x80, &(0x7f0000000380)="31c9424bcccfbb53c869a9252cc2385e891df4b477ae6c1db138e1402bad4201a97a33fac1526622db3aff0c4e5595b8c417a5a2bead0e403588e2d2f99aeed7d148dc2cbd25b280c75e902162bdad60c75aac359111ec12") 03:51:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:21 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x2, {0x0, 0x2710}, {0x5, 0x0, 0x23, 0x40, 0x9, 0x8, "1b4c29b9"}, 0x0, 0x3, @planes=&(0x7f0000000000)={0x0, 0x8001, @mem_offset=0x3fffc00, 0x9}, 0x2, 0x0, r2}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r5, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) 03:51:21 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2, 0x2, 0x3, 0x9, 0x1c, 0x0, 0x70bd2b, 0x25dfdbfc, [@sadb_address={0x5, 0x7, 0xd4, 0x20, 0x0, @in6={0xa, 0x4e21, 0x5, @empty, 0x11c4}}, @sadb_x_policy={0x8, 0x12, 0x3, 0x3, 0x0, 0x6e6bbf, 0x0, {0x6, 0x2b, 0x4, 0x8, 0x0, 0x5, 0x0, @in=@local, @in=@local}}, @sadb_sa={0x2, 0x1, 0x4d6, 0x0, 0x9, 0x85, 0x4, 0x20000000}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e24}, @sadb_sa={0x2, 0x1, 0x4d4, 0x1, 0x20, 0xd1, 0x0, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x3, 0x2, 0x0, 0x6e6bbe, 0x8, {0x6, 0x6c, 0x2, 0x0, 0x0, 0x80000000, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@local}}]}, 0xe0}}, 0x801) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000000)={0x8, 0x4, 0x3, 0x2, 0x2, [0x1, 0x7, 0x1, 0xc], [0x4dcd, 0x8, 0x8000000, 0x4], [0x6e20, 0x0, 0x76f, 0x9], [0xe2f8, 0x4, 0x4bd8c836]}) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') 03:51:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000001840)=[{&(0x7f00000001c0)=""/228, 0xe4}, {&(0x7f00000003c0)=""/240, 0xf0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000001580)=""/196, 0xc4}, {&(0x7f0000000040)}, {&(0x7f00000004c0)=""/67, 0x43}, {&(0x7f0000001680)=""/197, 0xc5}, {&(0x7f0000001780)=""/157, 0x9d}, {&(0x7f0000000140)=""/23, 0x17}], 0xa) 03:51:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup3(r2, r1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = accept$phonet_pipe(r3, &(0x7f0000000040), &(0x7f0000000140)=0x10) sendfile(r5, r1, 0x0, 0x7fffffa7) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r7}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r8, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xb7d}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2400c851}, 0x800) 03:51:21 executing program 5: r0 = socket(0x23, 0x5, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 648.710032][T19453] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19453 comm=syz-executor.3 03:51:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:22 executing program 5: r0 = socket(0x18, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000500), &(0x7f00000017c0)=0x4) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000001900)='./file0\x00', 0x1a5842, 0x12d) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/schedstat\x00', 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) r5 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x1c, 0xe, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) writev(r5, &(0x7f0000001700)=[{&(0x7f00000001c0)="5bf141dd083d87a9b5ed5b94488bab8e1f19822a97369f0e5b831ed1ce4056c28b04db9ba8d6831974e1a8257c3993216478df8e06548ee133e1c08f6125e618ed12cfe28dd5", 0x46}, {&(0x7f0000000240)="48294c9ecb170dcf9feb4b4bb7c61fedcf4e277b9b6f6a6b181173b3d1e9741985", 0x21}, {&(0x7f0000000280)="8a1737147a1baefd1ec44eea3c4852e0bdb2a4e57ed50c888888bdc67a861e", 0x1f}, {&(0x7f00000002c0)="1a779e1cdc166f2e07c4c2e28c874b2f46adff1a9b747d573183dcf6333191df70d501dd2ad2e563dce9a44aeec76789383150a2b0d8df9cea28ba0c8cfa97cd94fa6b639edd7f5dddb8aea53ee205fbb6fe1f4dac70a6636d0b2522d9a1830171c313a416d34d836ed5eecffc7be41ab3518c7531728a1dfe08a4103e886db6733a9184a327d633", 0x88}, {&(0x7f00000003c0)="4c96d323db9838856d66b52057dec366a8bb43cfc21e6527c864f3a127089d2a42792fe0ebd3d185e1b4d7cbd75c54e39e45043d7f32d790f074f4563c53709b349162e3e79a5648b3c33ab3e8e0593d02866588e1b475eb0880fb77df6c790522447c24026248b7b0a64d4f850c4ce31ed9d421e866f3009291b4323229214f336936a3a1a14fa6edb0f89edaa2e3a7621c7600290a5a1898f90b95b0a74fcc4f07af300a62f890fb63014f89ef1519c54277643932217a9b5110be00f628386e5281312653bafd56f5d77865d4a42979b3ee3bf5d46d2f8d2d8de19212aeb0bdf4203e3016e96870a7d9dbf445b0fb0f5966aeb6307af2", 0xf8}, {&(0x7f00000004c0)="545df75c5d5514d1eb57132a87eb112ea5a90b79a948fd3bfdcaa3d1a2e6decbff76ec46145c9872e0b74569af1f724b76a1d53d15bc4aae87c5e1be1b3a", 0x3e}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="7b6000ff60d1ed1546df80be591b99a188073457f79dba8b28abe680a2e6b7194b13563cf79ef116c43c51eda4e260a035d214c49874b28220792b54179b25f8818d9d0ed6b0571a70e73c", 0x4b}, {&(0x7f0000001600)="c705d38bfbdfee5d9052e460e7986582f03612e8f8cb506a741b5f477d8f3f7e4aa7251e9a107cd82961145885b3695c0071f76e689d8fbec54ac14b94a567d16f04e05ccb675083129ce2419e1dedcdedfea3b5c5d2bbd243d1b9f2a9858cac71bb0dffccaa3d564d0002c27646b99925ce8ccab8ddf8b5657907d3395e991589439ce70e3680d04ddaac865a40892b40bc5bff997a8129010396302371cfa5c28c84efd94d8bdc3cbd74d41ae4d67dfb46a4dd506bc0a8998983d9aaff15bff2b4da8e1f70e2459780dd5ff2f64ecf03f0259a51cbeafda5cee80f3364253c6e4c20", 0xe3}], 0x9) socket$unix(0x1, 0x2, 0x0) 03:51:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:22 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r8, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r6, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=""/53, 0x35, r9}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r5, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=""/22, 0x16, r9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x14, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x6a}, @jmp={0x5, 0x0, 0x6, 0xa, 0x5, 0xfffffffffffffff0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x1, 0x3, 0x50, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0xfffffff9, 0x37, &(0x7f0000000080)=""/55, 0x41100, 0x4, [], 0x0, 0xa, r0, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x8, 0x7fffffff, 0x6}, 0x10, r10, r0}, 0x78) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket(0x8, 0x6, 0x5) r4 = socket$inet(0x2, 0x80001, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(r7) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0)={r6}, 0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000040)={0x8, 0xa, 0x81, 0x0, r6}, 0x10) dup3(r2, r1, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) 03:51:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:23 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000280)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f00000000c0)={@rand_addr, 0x0}, &(0x7f0000000100)=0x14) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xe0, r3, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_AKM_SUITES={0x4}, @NL80211_ATTR_PBSS={0x4}, @NL80211_ATTR_TX_RATES={0xbc, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xb8, 0x1, [@NL80211_TXRATE_HT={0x45, 0x2, "8eb0f931bcbc5954f7e9ab61eebc5c4571a7783cd826d78325a48c61b7705183a0b28db55871ab23c371f1d7ad47765376a7208751b513e5096f63e554ff90ac17"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x28, 0x2, "3f2bbaa9e1b282ed76784e06e8eda6774fbf21925e2665e09c026f8d7807ae7aaddb9138"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1000, 0x0, 0x1f, 0x5, 0x3, 0xffff, 0x6, 0x8]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x1, 0x8001, 0xffff, 0xd42, 0x2, 0x40, 0x1]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x5, 0x2, 0x7e0, 0x0, 0xa2, 0xfffb, 0x7f]}}]}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20040000}, 0x81) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r0, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000002c0)={@loopback, @broadcast, @local}, &(0x7f0000000300)=0xc) r10 = openat(r9, &(0x7f0000000000)='./file0\x00', 0x304880, 0x60) ioctl$SIOCPNADDRESOURCE(r10, 0x89e0, &(0x7f0000000040)=0x2) 03:51:23 executing program 1: r0 = open(0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000080), &(0x7f0000000140)=0x4) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) dup3(r4, r2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150006008178a8001600400002400200000003ac040000d67f6f94007134cf6efb8000a007a290457f1289b316277ce06bbace8017cbec4c2ee5a7cef40d7b297b090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798d95667e04adcdf634c68a4059f1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27", 0xd7}, {&(0x7f0000000300)="b2", 0x1}], 0x2}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000040)={r3}) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) r7 = socket$inet(0x2, 0x80001, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000000c0)={r9}, 0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000340)={r9, @in6={{0xa, 0x4e24, 0x81, @remote, 0x80000000}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000400)={r10, 0xb5f7, 0x6}, 0x8) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 649.940815][T19514] IPv6: NLM_F_CREATE should be specified when creating new route [ 649.972349][T19514] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.1'. [ 650.014318][T19514] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 03:51:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$cifs(&(0x7f0000000040)='cifs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="8b6a8d32eeee7d7dd13c052dbd256874acfebe6749581c0958e2d4f8436674d39dbf34a34d69b0609275c8b812816af69cae0475d309e2e308d9f1b94bde161c4600386304acdc18413b4b2f6fb1a829db0c8a3782d324cb26d946dd3615af1089aaa70fb62a97eb030e097fb4b5d2cb1087ba23519e41a01986128060c2e04e0b2890a67c6491ee39a4621696b9f71dd6641e86eaaf9b3224941bd2c3949f914e61e88c4ba018b97a4d0e397d1c2272d7de793d4c77c586a5ebd06ef73abe4df7ddf0781731854c1275a55471e70cb40efac815571e3e", 0xd7, 0x8}, {&(0x7f00000002c0)="5061638f768e2809a03dde98e915e7f362aeb2d5a86516648f90fc1057738493a380318401d5010b859c8b9a225d3dc9036649294fd9662d2daea67b6e6917fb9de5dd6cad30e26c08d4d800b50367366eed263048672a16cbded69ffe6d438122aadd9dd6531806ddb3b2b177b94e16d67fb1bbe3e7fe5d12", 0x79, 0x101}], 0x80050, &(0x7f00000003c0)='\x00') r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x408600, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000580)=""/4096, &(0x7f0000000400)=0x1000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000440)=r7) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000004c0)={0x80, 0x7d, 0x1, {0x0, 0x79, 0xfff9, 0x5, {0x0, 0x1, 0x4}, 0x0, 0x8, 0x80000001, 0xffffffffffff81a4, 0x9, '/dev/vcs\x00', 0x8, 'vboxnet0', 0x28, 'posix_acl_accessvboxnet0*wlan1vmnet0ppp0', 0xd, '/proc/mdstat\x00'}}, 0x80) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 650.182446][T19519] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.1'. [ 650.191879][T19519] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 03:51:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000000000800030003000000", 0x24) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000400)=0x1, 0x4) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x1}) setuid(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) ptrace$setregs(0xf, 0x0, 0x80, &(0x7f0000000380)="31c9424bcccfbb53c869a9252cc2385e891df4b477ae6c1db138e1402bad4201a97a33fac1526622db3aff0c4e5595b8c417a5a2bead0e403588e2d2f99aeed7d148dc2cbd25b280c75e902162bdad60c75aac359111ec12") [ 650.442357][ T27] kauditd_printk_skb: 41 callbacks suppressed [ 650.442371][ T27] audit: type=1800 audit(1584762683.689:1126): pid=19530 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=194 res=0 03:51:23 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:23 executing program 5: r0 = socket(0x21, 0x2, 0x2) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$rds(0x15, 0x5, 0x0) syncfs(r0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0x60) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6d, r7}) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000000)={0x401, 0xb, 0x4, 0x100, 0x4, {}, {0x2, 0xc, 0x2, 0xc, 0x0, 0x4, "dadea5f4"}, 0x7, 0x4, @offset=0x3, 0x9, 0x0, r3}) ioctl$TIOCCONS(r8, 0x541d) [ 650.677058][ T27] audit: type=1804 audit(1584762683.729:1127): pid=19536 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/40/file0/file0" dev="loop0" ino=194 res=1 [ 650.737802][ T27] audit: type=1800 audit(1584762683.819:1128): pid=19539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=195 res=0 03:51:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400100, 0x0) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0xf85, 0x22100) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000001c0)={@local, 0x0}, &(0x7f0000000280)=0x14) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r7, 0xc2604111, &(0x7f0000000580)={0x5, [[0x9, 0x6fa, 0x9, 0x2, 0x80000001, 0x4], [0x5, 0x0, 0x1ff, 0x3, 0x8, 0x9, 0xffffffff, 0xff], [0xffffffff, 0x14000, 0xffffff79, 0x1000, 0x504b, 0x0, 0xfffffffa, 0x1]], [], [{0xfff, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x4, 0x894e, 0x1}, {0x4, 0x20, 0x1, 0x1, 0x1}, {0x9, 0x7, 0x0, 0x1, 0x1, 0x1}, {0x80000000, 0xffffff75, 0x1}, {0x2, 0x2, 0x1, 0x1}, {0x10001, 0x4, 0x0, 0x1, 0x1, 0x1}, {0x3, 0x6, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x8, 0x1, 0x0, 0x1, 0x1}, {0x8, 0x40}, {0x2b, 0x1adc, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x80000001, 0x0, 0x1}], [], 0x3}) bind$packet(r4, &(0x7f0000000200)={0x11, 0xc, r5, 0x1, 0x2, 0x6, @dev={[], 0x21}}, 0x14) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000800)={0x4a0, 0x13, 0x200, 0x70bd26, 0x3f, {0xb, 0x1, 0x1, 0x81, {0x4e23, 0x4e22, [0x80000001, 0x3f, 0x80000000, 0x2], [0x6, 0x9, 0x5, 0x6], r8, [0x3f, 0xaf3]}, 0x5, 0x7fff}, [@INET_DIAG_REQ_BYTECODE={0xf, 0x1, "a0aa832c52c195f5a467c2"}, @INET_DIAG_REQ_BYTECODE={0x42, 0x1, "457532508ceb172d8dbcee957a9b811f402d5957f08a427fb52f10d45c9f98c3f8a431b31ee353f2360f4dfb386d3d49012e81e02766441415bb6eb46203"}, @INET_DIAG_REQ_BYTECODE={0xf4, 0x1, "a16f30f957d9ebd1b9a68ffd5382249828a9de25a33b16a2551209fcdff422d6cb60a5081ae92e9af6643fb7c9f6399bccc6885cca677bfaac0f4f1d23d70c122d9ecfc63e2d263542c9ff66d3e53cf7d2a94b2ceb31ca05995ce7875d0291f331177d4f4858f0a662f314fc76d2f4f168e71d01c135494e1052b8d50d2608e6ec46e3bda8c1c76ef6a68315b9f24a7b3cb8622dbe0c88ab5cd34c44bd8953020ba6a418828e36677424804d4bea1816a9b532d3cbbf0eb514ecf68571754ab32368807bf854f9f4d5754a699066d794d27b0c29a825c30a8d40ef33c47ee0659b956bad824873be3e914d919dcfe646"}, @INET_DIAG_REQ_BYTECODE={0x17, 0x1, "45ac110a203d7dad4bbb64438ca40862787440"}, @INET_DIAG_REQ_BYTECODE={0x90, 0x1, "6d5ff84f3ef0eda2358ac4f3a63a6ee73a86731fa0dcade5eba0d6ee278934786d767a8d41658aede939c58c7402f3cf7280fd526008132d40d91bb0dff429013780c2d8aca676911aed2057c7651639a5f27ad406c5109e31eeac38da12da64f4d11f2dc63d73f57680b29f2830d63de88e2e25fb569b520c54872c7eae7defa1f1db239686ed76498043d0"}, @INET_DIAG_REQ_BYTECODE={0xb4, 0x1, "62f78c561f94b21d73ec5e680525d8367ff504b720db8146647e976a4f06fa4ec35a9613bccb9e6ed51ad6c143f1e5c6fd20280402e88cec797128d1e6a60ccded1b7bea0218c51805b5c0b24ad4f4dcafdd7a082219a6da9a3c463a80c57d73b72d9bfea03e910b1cabcbc0aaff0c515ae8f367315414e8b03abbb805f219587725dcfbdf831dd10ce333d393c5d8c4c9f3d4d0ed82418b3999e7ccbae89651ca6dc451b2862557760e8ea383d4f7d9"}, @INET_DIAG_REQ_BYTECODE={0xcb, 0x1, "9044bb9a4dc87419a2a7b0bc2f8591474ac17d1eaa4a8aaf624fd19f7742dcb2f343f8a817cf35b02f55762848b06b0eebdbbf6a691f6a710aaf168bef63d196fe1ba4a55055bb8f1c3fc0a262c3ad22b81380a9a4c22ab3aec4fc8ee3bd20242e0e04fb4960f9f856f0b4ce3d5da8c63d755a60f4695f406fe26bc41ccb5c0bdbf027aa27fcc92add2ca9bbc8e9cb71df336f8f2a1b1c62e3c4301bd98772ae75996449724a054cdf9a80c760093f8a8dcb5ae8873052976f33a68af85a0c55527e02a11c410b"}, @INET_DIAG_REQ_BYTECODE={0xe4, 0x1, "4761262a893219ca22909ac49565a0ce01bfe9105ec040a8b1b3f8606d2f76751d43abc0d3d9cb37b6b3012ba861cbbfd7965f973078b38c3bee3f383b656a1acb94ec088bbafe6dee54e1799bf6efac1d28c7d10fb423581932c436d56e727b2527c853c93220314c47a326aae2b88dd29d5448b167346c5defdcf2070177940391126f19cc84997a57f30fdf186c49d855c810d96a480fbbfcd0a628990254f35c5113da47de0e23c5eeca751e7a0bb1531f47f0148391cba647cf9d07671ab71d6860631da659a4ec6b1bb9504042b66014f222044c7ee6f7371245bcbc71"}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x4020}, 0x400c0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 650.845896][ T27] audit: type=1804 audit(1584762683.819:1129): pid=19539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/328/file0/file0" dev="loop3" ino=195 res=1 03:51:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800800", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 651.160407][T19541] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 651.219650][ T27] audit: type=1800 audit(1584762683.869:1130): pid=19544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16647 res=0 [ 651.222592][T19541] ipt_CLUSTERIP: Please specify destination IP [ 651.312326][ T27] audit: type=1804 audit(1584762683.879:1131): pid=19544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/79/file0" dev="sda1" ino=16647 res=1 [ 651.312351][ T27] audit: type=1800 audit(1584762684.349:1132): pid=19563 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16632 res=0 [ 651.312379][ T27] audit: type=1804 audit(1584762684.359:1133): pid=19563 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/329/file0/file0" dev="sda1" ino=16632 res=1 03:51:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = semget$private(0x0, 0x8, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0x3f}, {}], 0x2) semop(r1, &(0x7f0000000040)=[{0x0, 0xffff}], 0x1) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x2f68]) semctl$GETPID(r1, 0x3, 0xb, &(0x7f00000001c0)=""/112) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) 03:51:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000000000800030003000000", 0x24) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000400)=0x1, 0x4) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x1}) setuid(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378) ptrace$setregs(0xf, 0x0, 0x80, &(0x7f0000000380)="31c9424bcccfbb53c869a9252cc2385e891df4b477ae6c1db138e1402bad4201a97a33fac1526622db3aff0c4e5595b8c417a5a2bead0e403588e2d2f99aeed7d148dc2cbd25b280c75e902162bdad60c75aac359111ec12") 03:51:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 651.572855][ T27] audit: type=1800 audit(1584762684.829:1134): pid=19573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16632 res=0 [ 651.575001][ T27] audit: type=1804 audit(1584762684.829:1135): pid=19573 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/42/file0/file0" dev="sda1" ino=16632 res=1 03:51:25 executing program 5: r0 = socket(0x22, 0x2, 0x2) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x15, 0x400c2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) r3 = socket(0x22, 0x2, 0x2) getpeername$inet(r3, 0x0, 0x0) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) ioctl$IMGETDEVINFO(r5, 0x80044944, 0x0) write$nbd(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6744669800000000a94b0100010000003fcd6a3019da045d4be6d14cc3259d2e70eb2f7a3f668126b1d331ccc9779b91a901000080000000001bd70ac9e5c11e2e322ba59a5fe2f0f5beadcb72d2a71867d0c0d1a960636200007e8506be41fa815fef54056bfac3374d6dc3fedaa918d1fdf2c79ae219a07f9e07777048355de83e691f5abf7e865965ff7d292bb3244f8c34a5a6"], 0x90) 03:51:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800800", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 652.128271][T19589] ipt_CLUSTERIP: Please specify destination IP 03:51:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:25 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="08001f0000000000026c15a3d1ec5413b3d2d2ffdf92a87ea3bbd70613b44c24ea3696d6ef79c1743231b58fc105270c144396f654c228b94768dca96532391f52988478cb1093e1fd2447ea5d7827c7eea29b2ca25a7c9da9a8d366ab3409cfb3d3c502695f985bf76abf01d29b7ae458bca3e2fcd375abca7a60934a575266fa4e837ae995d8a176c7ac4d269081db9e1f59aba2e0c6bd5e6cbadfa812aaa9d06bd290f198e3acd4ceb0b1e9d51b1581d5b9626a24fb7d269dcf8c615662e79fe511d6c09c0dadcee88971041c1f6d64612779cda6ad9d89c16e005b7ba3e31bf09a007d1d544cb608fe1c55abed4f14157a779b77e00be1cdb603c3c0ca7ac990366370bfcc2d133ffd6a5390672b5933dd8852a4cc991d7bed88353ed90478364d288ab67b734f7a1ad135f0201f14fdf0"], 0x40}}, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x50000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)={0x94, r4, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x14dcb30d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000001}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x20060040}, 0x400c000) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000240)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000280)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x1c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r6, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) 03:51:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x200, 0x1) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mkdirat(r5, &(0x7f0000000140)='./file0\x00', 0x8c) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000500)={0x1, 0x10, 0xfa00, {&(0x7f00000004c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000580), r7}}, 0x18) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800800", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x4000010, r2, 0x7fffffff) r3 = socket(0x22, 0x2, 0x2) getpeername$inet(r3, 0x0, 0x0) ioctl$IMGETCOUNT(r3, 0x80044943, &(0x7f0000000000)) r4 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r4, 0x80044944, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x28800, 0x0) 03:51:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:26 executing program 5: socket(0x22, 0x2, 0x2) 03:51:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff00000000000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:27 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r7 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000000040)={@local, @loopback, 0x0}, &(0x7f0000000080)=0xc) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)={0x24, r5, 0x201, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}]}, 0x24}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x3c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r5, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r11}]}, 0x24}}, 0x40000) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff00000000000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff00000000000000400000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r5}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)={0x14, r7, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xbc, r7, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7cce}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbb1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x62a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x27fc}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xc0}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x20008088}, 0x20000840) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 655.459562][ T27] kauditd_printk_skb: 16 callbacks suppressed [ 655.459573][ T27] audit: type=1800 audit(1584762688.709:1152): pid=19699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=201 res=0 [ 655.606224][T19699] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=19699 comm=syz-executor.3 [ 655.698018][ T27] audit: type=1804 audit(1584762688.719:1153): pid=19699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/332/file0/file0" dev="loop3" ino=201 res=1 [ 655.823161][T19710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=19710 comm=syz-executor.3 03:51:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff0000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 655.916522][ T27] audit: type=1800 audit(1584762688.809:1154): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=202 res=0 03:51:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f00000012c0)='timerslack_ns\x00') lseek(r1, 0x9, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r5, r4, 0x0) r6 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x40, 0x40000) ioctl$MON_IOCQ_RING_SIZE(r6, 0x9205) sendfile(r3, r4, 0x0, 0x7fffffa7) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f00000001c0)) [ 656.071135][ T27] audit: type=1804 audit(1584762688.809:1155): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/49/file0/file0" dev="loop0" ino=202 res=1 [ 656.174849][ T27] audit: type=1800 audit(1584762689.399:1156): pid=19717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=203 res=0 03:51:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff0000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:29 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r3, 0x105, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x7d0, @media='udp\x00'}}}}, 0x68}}, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x202802, 0x0) connect$l2tp(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback, 0x1}, 0x10) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000200)={0x10, 0x2, 0x7}) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000000c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r3, 0x200, 0x70bd29, 0x25dfdbff, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20044090}, 0x51) [ 656.352823][ T27] audit: type=1804 audit(1584762689.399:1157): pid=19717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/50/file0/file0" dev="loop0" ino=203 res=1 [ 656.413849][ T27] audit: type=1800 audit(1584762689.649:1158): pid=19729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16649 res=0 [ 656.439089][ T27] audit: type=1804 audit(1584762689.659:1159): pid=19729 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/333/file0/file0" dev="sda1" ino=16649 res=1 [ 656.520870][ T27] audit: type=1800 audit(1584762689.769:1160): pid=19733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=204 res=0 [ 656.562339][ T27] audit: type=1804 audit(1584762689.799:1161): pid=19733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/51/file0/file0" dev="loop0" ino=204 res=1 03:51:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff0000000000000040000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c00"/22, 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:30 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x20080, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) kcmp(0x0, r2, 0x0, r3, r4) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r6}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r6, 0x495, 0x5ea8a2f}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x401, 0x0, 0x100, 0xfffffffa, r7}, 0x10) r8 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r8, 0x80044944, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000040), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SG_SET_RESERVED_SIZE(r9, 0x2275, &(0x7f0000000000)) 03:51:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 657.150770][T19755] FAT-fs (loop3): bogus number of reserved sectors 03:51:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 657.305561][T19755] FAT-fs (loop3): Can't find a valid FAT filesystem [ 657.544874][T19755] FAT-fs (loop3): bogus number of reserved sectors [ 657.551492][T19755] FAT-fs (loop3): Can't find a valid FAT filesystem 03:51:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x408100, 0x0) write$UHID_INPUT(r0, &(0x7f0000000040)={0x8, {"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", 0x1000}}, 0x1006) r1 = socket(0x22, 0x2, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) sendmsg$nl_xfrm(r1, &(0x7f0000001340)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)=@newpolicy={0xc4, 0x13, 0x1, 0x70bd2c, 0x3ba8ef1f, {{@in6=@loopback, @in6=@empty, 0x4e24, 0x101, 0x4e21, 0x8, 0x2, 0xa0, 0xa0, 0x3a, r5, r7}, {0x7, 0x2, 0x7, 0xb7aa, 0x2, 0x6, 0x9, 0x1f}, {0x200, 0xa58, 0x20, 0xfff}, 0x8, 0x6e6bbe, 0x1, 0x1, 0x3, 0x1}, [@lastused={0xc, 0xf, 0xfffffffffffffffe}]}, 0xc4}, 0x1, 0x0, 0x0, 0x81}, 0x381510de65a076fc) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r8, 0x105, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x7d0, @media='udp\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000001140)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x1c, r8, 0x300, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40008c4) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000001180)={0x1, 0x0, {0x2f, 0x37, 0x10, 0x10, 0x1, 0xa, 0x1, 0xa6, 0xffffffffffffffff}}) 03:51:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x2) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) [ 657.759699][T19774] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x4}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000200)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000080)={0x1f, 0x0, 0x1}, 0x6) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r5, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) 03:51:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000280)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0f7cef7974000000", @ANYRES16=r3, @ANYBLOB="000425bd7000ffdbdf251d00000054002380050011000000000006001b000100000006000c000500000006000400f00000000600180006000000050008000500000006000d0007000000080017000600000006000a001f00000006001900000000000c0099002f36000003000000"], 0x74}}, 0x95) r6 = socket(0x25, 0x5, 0x1) ioctl$IMGETDEVINFO(r6, 0x80044944, 0x0) [ 658.657719][T19802] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:32 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001780)={{{@in6=@dev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000001880)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$can_raw(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f00000018c0)={0x1d, r0}, 0x10, &(0x7f0000001980)={&(0x7f0000001900)=@canfd={{0x3, 0x1, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "63d3040abb20c9326731a1d89066431f8d3e437ac0af24ae0169558437530b3fefcb1e053b468f2da316bc77ba7663cd768b5090bf20558805b1ee75d8f52fa2"}, 0x48}, 0x1, 0x0, 0x0, 0x4004000}, 0x45) r1 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) 03:51:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000040)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) r6 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = getpgid(r6) prlimit64(r7, 0xa, &(0x7f00000001c0)={0xe49, 0x8}, &(0x7f0000000200)) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r8 = socket$rds(0x15, 0x5, 0x0) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000140)={{r8}, 0x100000001, 0xed, 0xfff}) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000180)={0x401, 0x5ad6, 0xf5ce, 0x0, 0x11, "c7790c48490b9524"}) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) keyctl$read(0xb, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) keyctl$read(0xb, r3, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$revoke(0x3, r4) keyctl$read(0xb, r4, 0x0, 0x0) r5 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="9fcafa64e3da165d1f19dc7fceaba3dddb482f61bce7bd3778aab34dc920572116b1602f77b4f37d0a21d9e3a6c642aa6282b2970a95e23ab3f7f49bdc6bfd1a1d1ff396773d9fc064cc7248823fad598f297460b89a0e6098d3f3f09ce2f3809f9e9c8546c6cbe80ed1c1db3e0d662da10009582c5deba8d0bd8c4c4c591f11451c4b23", 0x84, r4) keyctl$KEYCTL_MOVE(0x1e, r5, r3, r5, 0x0) r6 = socket(0x22, 0x2, 0x8) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x42, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x4) ioctl$IMGETDEVINFO(r6, 0x80044944, 0x0) [ 659.410036][T19847] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce8"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2003, 0x100) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000001, 0x50, r4, 0xdbfdc000) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, 0x0, 0x0) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:33 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x7, 0x1, 0x1, 0x966}]}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000000)=0xf2a) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:33 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1d8, r3, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_SOCK={0xa0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x20}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x68f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}]}]}, @TIPC_NLA_LINK={0xbc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfb4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x4048040}, 0x20000000) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 660.303991][T19881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce8"], 0x5}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:33 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000000)) 03:51:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r2, 0x1, 0x0, 0x0, {0x30}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x184, r2, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}]}, 0x184}, 0x1, 0x0, 0x0, 0x8041}, 0x20040000) fchdir(r0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r5, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) 03:51:34 executing program 5: r0 = socket(0x22, 0x4, 0x81000002) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, 0x0, 0x0) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 660.788463][T19903] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 03:51:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c000280080001", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 660.860367][ T27] kauditd_printk_skb: 26 callbacks suppressed [ 660.860380][ T27] audit: type=1800 audit(1584762694.109:1188): pid=19911 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=214 res=0 [ 661.098982][T19917] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 661.112432][ T27] audit: type=1800 audit(1584762694.119:1189): pid=19913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=215 res=0 03:51:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0/file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x1, 0x3}) write$input_event(r3, &(0x7f0000000040)={{0x77359400}, 0x1, 0x1, 0x4fa1}, 0x18) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:34 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000000)="14064eb1d80932c5710424b090b11f4542c951b4fd0c82bdf465ef0ee3d7f1d06aadffb6a08714b3100a3f945dcbeebc2cb3a8be776f48dc12af762518ae05f50c4086c2d729e9afe8b1eece7f9ed3c7a0cfbb1ca9b8599a893bd00040c2ffbf34ba0a12888b8448604cca4116380a7d9c4184a1054a98f8e14c1441e0eacc1f44365ff701b826c27c1f77bf35365c39d16cfde88a2df30b31d16b17503cd7b2407c1017a819c4a01699988b2332edb2f3d38b141926d3e443ed4c4891996e6d252721f384fcb29f7af589ed7bbc9985953d7871e0cc0b1bb66f9682f42c725f24a973d88c85e8ad0748", 0xea) [ 661.319258][ T27] audit: type=1804 audit(1584762694.159:1190): pid=19911 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/339/file0/file0" dev="loop3" ino=214 res=1 03:51:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 661.520678][ T27] audit: type=1804 audit(1584762694.259:1191): pid=19913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir239122750/syzkaller.wO0fIj/181/file0/file0" dev="loop2" ino=215 res=1 [ 661.610384][ T27] audit: type=1800 audit(1584762694.299:1192): pid=19925 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16665 res=0 03:51:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, 0x0, 0x0) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 661.634113][ T27] audit: type=1804 audit(1584762694.329:1193): pid=19925 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/57/file0/file0" dev="sda1" ino=16665 res=1 03:51:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040)=0x7ff, 0x4) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:35 executing program 5: r0 = socket(0x9, 0x80000, 0xe24e) r1 = socket$netlink(0x10, 0x3, 0x0) chmod(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xffffff68, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}, @IFLA_NET_NS_PID={0x0, 0x13, r3}]}, 0x40}}, 0x0) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000280)=@int=0x2, 0x4) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f5, 0x300, 0x70bd29, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}}, 0x40f0) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000780)={'syz1\x00', {0x7ff, 0x5, 0xeba, 0x5}, 0x56, [0xf22f, 0x9, 0xe89, 0xd2, 0x8, 0x8001, 0x8, 0x6, 0x3f, 0x3ffc00, 0x2, 0xfffffff8, 0x4000, 0x80000001, 0x3bdd39bc, 0x1, 0x9, 0x0, 0x0, 0x5, 0xb04, 0x0, 0x0, 0x4, 0x200, 0x18800000, 0x9, 0x4, 0x54, 0x0, 0x8, 0x5, 0x3, 0x4, 0x67, 0x2, 0x2, 0x81, 0x0, 0xc, 0x200, 0x3, 0x3, 0xff, 0x7, 0x87e2, 0x6, 0x1f, 0x1, 0x7fff, 0x4659, 0x7d75, 0x400, 0x9, 0x4, 0x7, 0x80000000, 0x6, 0x2, 0x4, 0x40, 0x5, 0x2, 0x6], [0x7fff, 0xffff, 0x6, 0x1b4c, 0x8, 0x80000001, 0xb07c, 0x6, 0x10000, 0x5, 0x400, 0xd260, 0x4d, 0x4, 0x401, 0x0, 0x81, 0x7, 0x10000, 0x40, 0x3f, 0x7ff, 0x2, 0x0, 0x7ff, 0x80000001, 0x7, 0x4, 0x1, 0x56, 0x4c0, 0x8000, 0x1, 0x8, 0x80000000, 0x8, 0x101, 0x6, 0x63b1, 0x3, 0xffe00000, 0x1, 0x10000, 0x81, 0xda, 0x80, 0x6, 0x0, 0x7, 0xa9, 0xffffffe1, 0x1f, 0x5, 0x80000000, 0x6, 0x1, 0x56e, 0xde, 0x1, 0x4, 0xffff, 0x4c25ccdb, 0xfffff8cb, 0x8], [0x7, 0x3, 0x8, 0x9c1a, 0xffff, 0x6, 0x1, 0x1f, 0x6, 0x3, 0x8, 0x0, 0x8001, 0x7, 0x9406, 0xffff, 0x3ef1d41d, 0x19, 0x2, 0x6, 0x6, 0x2, 0x7fffffff, 0x8, 0x0, 0x8, 0x1, 0x3, 0x10000, 0x40, 0x100, 0x6, 0x4, 0x401, 0x5, 0x1ff, 0x8, 0x0, 0x3, 0x6, 0x79a3, 0x8, 0x1, 0x0, 0x3c7b, 0x8, 0x48000, 0xe90, 0x6, 0x8, 0x4, 0x10001, 0x3, 0xf40, 0x3ff, 0x0, 0x0, 0x7, 0x6, 0xf91, 0x8, 0x400, 0xdb5, 0x1ff], [0xffffffff, 0x1, 0xffff, 0x29, 0xffff, 0x1ff, 0x9, 0x4, 0x2, 0x8, 0x5e, 0x101, 0x9, 0x3, 0xffff, 0x8, 0x0, 0x0, 0x7fffffff, 0x0, 0x2, 0x7ff, 0x200000, 0xfffffff9, 0x0, 0x200, 0x20, 0x401, 0x4, 0x2, 0xffffff80, 0x800, 0x3, 0xfffffffb, 0x15, 0x7, 0x5, 0x20, 0x9, 0x9, 0x3, 0xfffffc00, 0x0, 0xd8de, 0x400, 0x3f, 0x81, 0x4, 0xfffffffb, 0x5, 0x101, 0x6, 0x9, 0x1ff, 0x95, 0x10001, 0x5, 0x7fffffff, 0x3, 0x35, 0x3, 0x1f, 0x800, 0xf6e4]}, 0x45c) iopl(0x81) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r6}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r7, 0x200, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x9f, @bearer=@udp='udp:syz1\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x44001}, 0xc000) [ 661.905948][T19955] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 661.995713][T19955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 662.028316][ T27] audit: type=1800 audit(1584762695.279:1194): pid=19957 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=216 res=0 [ 662.062722][T19955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=19955 comm=syz-executor.5 [ 662.112713][T19969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 662.129690][T19969] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 662.146634][T19970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 662.158122][T19964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=19964 comm=syz-executor.5 [ 662.330437][ T27] audit: type=1800 audit(1584762695.309:1195): pid=19967 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16697 res=0 03:51:35 executing program 2: r0 = socket(0x22, 0x2, 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000e00)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000d40)="16", 0x1}, 0x68) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r4}, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x1, {0x0, 0x0, 0x0, 0x0, 0x51003}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r6}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="58e00000", @ANYRES16=r7, @ANYBLOB="00012dbd7000fcdbdf250400000008000300000001000500050000000000080003000800000014000100ff01000000000000000000000000000108000300ff030000050006000500000005000600f9000000"], 0x58}, 0x1, 0x0, 0x0, 0x80104}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={r4, 0x8, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r8, 0xfffffffc, 0x30}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x8d, 0x4) [ 662.378777][ T27] audit: type=1804 audit(1584762695.329:1196): pid=19967 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir446266064/syzkaller.eULK9F/341/file0/file0" dev="sda1" ino=16697 res=1 03:51:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x7) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:35 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1411, 0x800, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x18}}, 0x0) [ 662.479410][ T27] audit: type=1804 audit(1584762695.329:1197): pid=19965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/58/file0/file0" dev="loop0" ino=216 res=1 03:51:35 executing program 5: openat$audio1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio1\x00', 0x2000, 0x0) r0 = socket(0x26, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140), 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0x2, 0x1ff) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f00000002c0)={{0x2, 0x0, @descriptor="95cc3a43da6e4a70"}}) pwrite64(r4, &(0x7f00000001c0)="d9441bd7bc381a12de0006e7472c6747da7d782c595f583f7ae051fb5612dbfab057de0634e1436f56caf5891fbbf56644ecbe633c8c44af21b86fb6040cb292558752eb8d6dd0f44db883199d30c4e1ca117ca1306f13c613349015a78bd08b8d823393c77df5413da70ed3a311de578de031fce1dafca70a6f434f77f21aa1865219319007c5313b1ac72c7dd8ffec278fc8d26acac3602a8f39ff57bb8c9185793411d5191ba746ad96965b33444d6c7dee671ae5e6f9797aedf90b0ed2d144f0e22490a02ed7a78605ddc92bbbb816ac5e45f286ca2685e172ed", 0xdc, 0x1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setuid(r6) 03:51:36 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000040)) socket(0x23, 0x802, 0x80000000) [ 663.362705][T20007] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$uid(0x3, r1, 0x86ac) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x80040, 0x0) ioctl$VIDIOC_G_PRIORITY(r5, 0x80045643, 0x3) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r6, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x18, 0x0, &(0x7f0000000040)=[@request_death, @decrefs={0x40046307, 0x3}], 0x0, 0x0, &(0x7f0000000140)}) 03:51:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140), 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140), 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:37 executing program 5: r0 = socket(0x1d, 0x4, 0x2) r1 = socket(0x22, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000180)=""/62, &(0x7f00000001c0)=0x3e) getpeername$inet(r1, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2000, 0x0) r2 = socket(0x22, 0x2, 0x2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002dbd7000ffdbdf251f0000000700210062620000000800010003edffff0400920005000000"], 0x3c}, 0x1, 0x0, 0x0, 0x48810}, 0x4000) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r5}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x810}, 0x4000010) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0500000000000000000001000000040004000500050009000000050006000000000008000300970d00007d695d6c8712fd67745ecbaa20c64389f85d0d9cd5c97633075de0ce069b8d06d323b70527f6"], 0x30}, 0x1, 0x6c}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000003c0)={0xf000000, 0x4, 0xf1fb, 0xffffffffffffffff, 0x0, &(0x7f0000000380)={0xa10906, 0x6, [], @p_u8=&(0x7f0000000340)=0x7}}) sendmsg$IPCTNL_MSG_EXP_NEW(r8, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000640)={0x150, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @ipv4={[], [], @broadcast}}}}]}, @CTA_EXPECT_TUPLE={0x88, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @remote}}}]}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1}, @CTA_EXPECT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x98}, @CTA_EXPECT_TUPLE={0x68, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr="dd109693ef4d48ebdbaeecfe720189f6"}, {0x14, 0x4, @rand_addr="ffc4002f971e6272a721fa8050bdc74c"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x48880}, 0x88d) sendmsg$SEG6_CMD_DUMPHMAC(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, r7, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x27}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x59b}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9d}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000081}, 0x4080) getpeername$inet(r2, 0x0, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) 03:51:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0xfffffffffffffffd}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1e) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 664.096251][T20034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 664.258675][T20039] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:51:37 executing program 5: r0 = socket(0x22, 0x1, 0x20) r1 = socket(0x22, 0x2, 0x82) getpeername$inet(r1, 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:37 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1, 0xffff}) 03:51:38 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x511040, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, 0x0) 03:51:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140), 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 665.633091][T20077] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x0, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:39 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r2, 0x105, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x7d0, @media='udp\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x39, r2, 0x2, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5001}, 0x20004084) r3 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r3, 0x80044944, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000000)={'team0\x00', {0x2, 0x4e23, @loopback}}) 03:51:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x4}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 666.358685][ T27] kauditd_printk_skb: 15 callbacks suppressed [ 666.358699][ T27] audit: type=1800 audit(1584762699.609:1213): pid=20096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=224 res=0 [ 666.435017][ T27] audit: type=1800 audit(1584762699.649:1214): pid=20102 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16561 res=0 [ 666.454713][T20097] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 666.459253][ T27] audit: type=1804 audit(1584762699.669:1215): pid=20097 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/62/file0/file0" dev="sda1" ino=16561 res=1 [ 666.552432][ T27] audit: type=1804 audit(1584762699.719:1216): pid=20096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir239122750/syzkaller.wO0fIj/187/file0/file0" dev="loop2" ino=224 res=1 [ 669.573400][T20115] IPVS: ftp: loaded support on port[0] = 21 [ 669.796172][T20115] chnl_net:caif_netlink_parms(): no params data found [ 669.960885][T20115] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.968286][T20115] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.977081][T20115] device bridge_slave_0 entered promiscuous mode [ 669.987994][T20115] bridge0: port 2(bridge_slave_1) entered blocking state [ 669.995526][T20115] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.004265][T20115] device bridge_slave_1 entered promiscuous mode [ 670.037147][T20115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 670.050527][T20115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 670.080532][T20115] team0: Port device team_slave_0 added [ 670.090201][T20115] team0: Port device team_slave_1 added [ 670.130922][T20115] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 670.138387][T20115] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 670.176321][T20115] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 670.206431][T20115] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 670.213893][T20115] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 670.239977][T20115] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 670.345973][T20115] device hsr_slave_0 entered promiscuous mode [ 670.392741][T20115] device hsr_slave_1 entered promiscuous mode [ 670.442329][T20115] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 670.452341][T20115] Cannot create hsr debugfs directory [ 670.648923][T20115] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.656068][T20115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.663544][T20115] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.670619][T20115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.808393][T20115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 670.835712][T18494] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.855910][T18494] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.894474][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 670.969914][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 670.979319][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 671.008823][T20115] 8021q: adding VLAN 0 to HW filter on device team0 [ 671.044030][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 671.054807][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 671.063523][T15615] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.070589][T15615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 671.092549][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 671.101599][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 671.117981][T15615] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.125217][T15615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 671.142103][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 671.172158][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 671.181639][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 671.198983][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 671.227033][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 671.244541][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 671.259054][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 671.285475][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 671.299214][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 671.309863][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 671.328833][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 671.344521][T20115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 671.399814][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 671.416563][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 671.441849][T20115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 671.577872][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 671.591368][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 671.639472][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 671.657393][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 671.675029][T20115] device veth0_vlan entered promiscuous mode [ 671.690849][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 671.700207][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 671.730466][T20115] device veth1_vlan entered promiscuous mode [ 671.799536][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 671.816770][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 671.828712][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 671.841711][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 671.865914][T20115] device veth0_macvtap entered promiscuous mode [ 671.886486][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 671.908135][T20115] device veth1_macvtap entered promiscuous mode [ 671.965819][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.980325][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.990989][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.005920][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.015916][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.026396][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.037512][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.048104][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.057941][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.068382][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.078219][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.088680][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.099919][T20115] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 672.108108][ T2710] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 672.117948][ T2710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 672.130163][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.140840][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.151481][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.162289][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.172093][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.182786][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.199387][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.209995][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.219837][T20115] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.230292][T20115] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.241540][T20115] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 672.254317][T18447] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 672.263505][T18447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 672.544209][T20128] FAT-fs (loop3): bogus number of reserved sectors [ 672.550858][T20128] FAT-fs (loop3): Can't find a valid FAT filesystem [ 672.610614][ T27] audit: type=1800 audit(1584762705.859:1217): pid=20128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16715 res=0 [ 672.619152][T20128] FAT-fs (loop3): bogus number of reserved sectors [ 672.640701][T20128] FAT-fs (loop3): Can't find a valid FAT filesystem [ 672.648960][ T27] audit: type=1804 audit(1584762705.859:1218): pid=20128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/0/file0/file0" dev="sda1" ino=16715 res=1 03:51:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={{r4}, 0x4, 0x6, 0x1}) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:45 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_getscheduler(r2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x101000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000100)={'team0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r4, 0xc0245720, &(0x7f0000000000)) 03:51:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x0, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:45 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000001c0)={r3}) write$P9_RVERSION(r2, &(0x7f0000000200)={0x13, 0x65, 0xffff, 0x7ff, 0x6, '9P2000'}, 0x13) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/28}) r7 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x8) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/keys\x00', 0x0, 0x0) dup3(r8, r7, 0x0) sendfile(r4, r7, 0x0, 0x7fffffa7) [ 672.865679][ T27] audit: type=1800 audit(1584762706.119:1219): pid=20140 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16728 res=0 [ 672.933463][ T27] audit: type=1800 audit(1584762706.129:1220): pid=20147 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=225 res=0 [ 672.957150][ T27] audit: type=1804 audit(1584762706.139:1221): pid=20147 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir239122750/syzkaller.wO0fIj/188/file0/file0" dev="loop2" ino=225 res=1 [ 672.970243][T20143] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 672.985545][ T27] audit: type=1800 audit(1584762706.149:1222): pid=20143 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=226 res=0 [ 673.030956][ T27] audit: type=1804 audit(1584762706.149:1223): pid=20143 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/63/file0/file0" dev="loop0" ino=226 res=1 03:51:46 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000040)={0x8, 'syz_tun\x00', {'veth1_virt_wifi\x00'}, 0x9}) r1 = socket(0x26, 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x87}, {0x6}]}, 0x10) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) [ 673.140520][ T27] audit: type=1804 audit(1584762706.319:1224): pid=20153 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/80/file0" dev="sda1" ino=16728 res=1 03:51:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 673.176856][ T27] audit: type=1800 audit(1584762706.379:1225): pid=20154 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=227 res=0 [ 673.212878][ T27] audit: type=1804 audit(1584762706.379:1226): pid=20154 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/1/file0/file0" dev="loop3" ino=227 res=1 03:51:46 executing program 1: open(0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000100)='nfs4\x00', &(0x7f0000000140)='./file0\x00', 0x3ff, 0x3, &(0x7f00000003c0)=[{&(0x7f00000001c0)="8581a463c211d7f5960a62b954455f7ad6eae166244c74c699934afdfac99ab97b089b0640101db25f636846798e6f6f83e2c898cc892f2c67c7741ced4eb11aacc6766b6bae20cfac45ef57b0374bab08d8efb9353a61a77e8cdc8220e786daec600cabe86ee2a78777ca63e38144c2b4e6c36f764179ef7857b493c1a6448753574c513df0ffe169", 0x89, 0xa9}, {&(0x7f0000000280)="f11005fd64936d66c30ad960eebdd2276f1e86b7fce1f14b1285ee02670d4bc561cecda60462165a696132bb6a91e2c52a7bd15a139843c084a76c95894af0dcc3092d51d2c440df92f902cb3251be6761b6a0015a072b69ab81a8c6d79f7b49fe4d783bd673840b5897d7f51705543ec8969f0f0370fa90e7eec31bdf849e81b90c84114e4182ed6d4e309d06488d277fe28cb3fa709c70b5b9024a1824467b4e3ba8b215412407de8b2871868eabd4750f36cb72f3c3cd6842749f6951d556f789dcc0213d41211d632904", 0xcc, 0x8}, {&(0x7f0000000380)="408915bcc0804b45c117e69b413199e433a0d0ea6ece3a484ef67366187070af60a222f69da9113704bd0c", 0x2b, 0x7}], 0x90000, &(0x7f0000000440)='/proc/mdstat\x00') fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x604043, 0x3e) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r5}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r4, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x20, 0x1406, 0x2, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x240000c0) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$sock_SIOCINQ(r7, 0x541b, &(0x7f0000000480)) ioctl$KVM_GET_DEVICE_ATTR(r6, 0x4018aee2, &(0x7f0000000040)={0x0, 0x1, 0x2, &(0x7f0000000000)=0x54}) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x1410, 0x200, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40c4010}, 0x4018890) 03:51:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x0, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:47 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x22c200, 0x0) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000080)=0x2) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000000)={0x0, 0x2, 0x3, 0x8, 0xcde}) [ 673.758804][T20187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=20187 comm=syz-executor.1 03:51:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400205) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) write$snddsp(r4, &(0x7f00000000c0)="d175b664654b4fa687c84c7fe4fa69d844478759b5ff8a4e5678a083253767025f1aa6df6625fb34e8429bca2cf817dab12be361827c1b4c92ba4463ad98acee2304077fc45236b9b4436d3b5e4f39678712b0cf19a6d32f657a2f662a0424d05703757ed24a925db29e91c72708aded4efcd9d6f90f5ac221a2c85435be", 0x7e) r5 = socket(0x22, 0xa, 0x2) ioctl$IMGETDEVINFO(r5, 0x80044944, 0x0) 03:51:47 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) r4 = accept(r1, 0x0, &(0x7f0000000a40)) sendmsg$inet_sctp(r4, &(0x7f0000001f40)={&(0x7f0000000a80)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000001e40)=[{&(0x7f0000000ac0)="f3ed7e57b0426b650f1b226318e6917b887e1dd4e955ed091883307c36d397d017d1c5759b8edd8043e95c0b52e01131403c4c75e9", 0x35}, {&(0x7f0000000b00)="62cd045ae171208cec52e6e0f3c39617a471c87be9d0d8e513d515bd59018d58be6ba4ee173568b9655f74e22703412e854e500e397276f8f656593442e83822c392adcca8b3c9bc159746c7d2a18df02507be45dec0fe2d576c13488899f0b833bd94c12a399577bf49fea7960ddb268bd332c576271752470befa157a7520bcfef5cfc4c503b23acfeb1430e15ebf40530877a1e4cfd4f409f1a4deec221d3fb037619c613fb7bed9c183664398196038c63adb200f22cbb4dc57967490efff9fd0d9f110d55c2a6c1d252b651a7bd3a3b44", 0xd3}, {&(0x7f0000000c00)="b9ecf6f0ec91bf84f74f70bb8b9b1a7c230fe10e57546864ff95c1dd58959a0f3a8ef474701f866bbc332955249ab74c08f69510a01614be4d441129", 0x3c}, {&(0x7f0000000c40)="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", 0xfd}, {&(0x7f0000000d40)="2bb39c86805f79c2b92e0c27727839ca9bb43df1be13b55bb668ed665a3cdac4293edc719c3714fd6f6b534b4179b08b2fbf28828a9aca69d7b297ea2c9d19f7f82a738715b5da7cba67e7c632edc7c2b9acf6d4214e17a28b5f1b3cb363d12d2bc4ecae5ead39772a325539651abdf29cc70a2e72921210ace03136a07ef26b27045bb295cfe65bf859492fe1607a15171d7c73ffeec4b14febd6b28a2fe83bffa0cc3a30cce074858e8cf3e608d6cec7551297a18420a53d99a0e1e8d1528aec20332c0378cfe4e5da02ad2a1ecabd73d0c63ce315a0937f258f0e4462c03688d8c369eae5d00914914ec97e5b7a88e82163b996c27c1a60e7958b86ade2076ec5977d58d81c87295bce3f9a1ac0d28bed5a5d58d216ca697768476bf825768488aa2ddd50d33a5305d8a8f2f65657e7391febc8f19f78fc042d30a3d713bfc6bdb49cf2aa2035250bdbed0fc7556500efc084272cca99c9ff78105604ea450cbdecb2d93b981980d697f5fe90fb94811e434fd9062f9bb2f14352b21eb2ac034d8c2f5c4d8c4464adb1c3fdb765ec9e72cd9ba29e2979e0f087dc1532fa99209958e997dee20c291bd5be9ae782c813d8e9bc1aa669ba0a534eb898a33ce4739654c283afefd25126ea0f9be2825eee485ccecf7638066a820f967f8b6b2a244f89ed2ef3d79b432af07918bf6332ab56f548c2c57aa6614ae39575148d57da36c540432f25ef2e6e9ca067e982aff38fd96ef5956bebbbe729efbd07526decc81f2cf0d6664755473451ea5683aefa4e59420f2443908c190e1a5c67e3fdce05b8ab03a8cfef0afb272c60aa53ac9bf750135130c57c0a6898559bd3fd80199c7540e3a1ee83c7d527ea8990cf86f949aeaac68e974e816d3df231d95424d25e8fe086ee039e06063c85cc63a9e16c2bcf17c927b664f6fc98dd6017af5e1611f9e3507d1be4e0c7b7b9c9dcf4b346166e7a37ae806d6b445789216c14ae8c00874769531e93ec608cb4d25596d8ab7dc5c65496c09bb3835d8a8e8d4daa6249fbf29eb6d2305fb3b2f1f7faa18348a0c289dcf3a527871adc7aa801fa62d377912515a33aff34ee3eca9e4ce254adecce67c564d56388ce508571b9736ed026bbdce7c47a51c6bd94530e87c5c63db30402419069e66ce55578b3aa8c0c87bdb84427e02d5822dbe28c75d6efcc1e32bf4f6e80c230d79f86aeda42b2c1713275a9ec6db7eed8d9a8326f5ca5886e74facd13f96c58fb301d92e3ae07530fa4778cfb9ac9ea545a1630e888313c5ef14a58d12566ffa33336df5cdf22709f20c8c1c2ea5cdc6fd2eaa8a5b67caf4dd795210f1a16e4e359d80dbdb422007032c947b5d0c80144033956191d0096ccd04f614e99eed08430b33fd28402992538ac2214e1db254964475b42f37aeb1d2fe49e91c72fb221e690c723f294c11da08a5a68beffce425dd877622bca0e3bbc34abcb7e5d455282a6d76ddb3056eb02ae5216b437278972deeb67f41762b72df58b5220cbe5d4d55414df79b2ea15c7a133f5192cac105d5e6e3816dd37637c067a0aa2868fa3057158a0022eca03e473037e936ff19e7340ed975cf2a5514ba06a3f585972d501c9653ac2c992508da0eaa47a40c19f2f8107e8665d01a168e687b03e2a560462747398cc85ff42169d4d00a11570faca60978ab08cbd67f03419f1876767440728857ba236964cc31779c3fe9edeba0a43619e8c3a1c4a1fdd90d64c1f4a6e82f66b2f6e42d3f45cb1d64f5137f5d6c0b57fa27c656ec4f5507649ca45d221e242a872f25191fd1712351bacab107ad99f59a417a5dad78b1bc209e92c6b1399e6fae376d9560ec2049effea124aa5df36782c03b3dcd3b0c803e8d650ebaae6fd6c79b59f79abb31f944124502a9986c74c0e80fdfb8bd8517d269b40b3c7edd806703279b0aff4a21b1d44a1ba7ee1cf0fa48357dcb6d14b386853f6f8c0eef9b1a70bcbc2cc0d27882fbaa91f306a54d7ed00880745558fe27b0d60ada6f5a835b27573e5bf59ac0e67de964d31e6efea498798a43101650ccdc3d1ec1081793ad93d72feefdc992186a9753f41ec3a97e2212aa40a47912a722f569a0ed89d2710a5e049c0c2acd82a9f3774a485b3def360aaa0c43fb482fcb551da280da0125fc5ec058f8cb61260a6a6b5a40b8ae75eefa29f689239225031918f6952e75d0dc618160ca1d2d192d1ea716f4cefff17e40ca5275e245237eeba977a591e09fd2f9dd91580d3dde5c4fc994ff2414060f3a0bca99051b15c71d77210294dea3ea2411a9b1533b93c266983109f643a313a40b56ce3a06e9a7b89f43d24b83dead4d943de652362ec9f7a806b9eda60a6bf6d83f0c29879a8faa07df5847e3351a0ea9ecee78885fba7b9700a0463e04b8facd661c5d4b6b0ee6e3952a23e90ed78519b88a504e49f3db57060506f1196cce2c3499047d979e01c4b410a52755aabb37b31ab3135a5b3f0f6c990df868e6da681b1a7495d1755f53bd619f84baa7860ecb7628cb52411264ca588a42bc3eb8254f5c4a5a89ac80debbdcc91058a9485ef637f0bfc21ef104b99adb485ea47e36236ea31a91db21b59f365b71f6d5ab70102d83573a36ee3915830d8c185639e61ce66f61ca72a961d7b929ab333b2849ed4bbc66c5d0881514bb083f202e47c19a5b7d83ca368927c1df79a48b00b914f787181a058acc52fd4749de5419eb1adf4a7690c393d8a2566690b5315453819360f57da9ef9253903bcd18db44e9b75772065af203c5b805ee20bd413c5405cca04e0f1fa52a8ec1b22b2e3144555086dd4dd6c379636755f5902161c628fafd07019779322ff4cb596e14075e2b2f9d1c18dac42056197eb72c591fb015265db5eb6b13baea22722c60442d3421c92ee1d6e5a79f5fe36cd1ec27e6835ea72318ee62c520f074fd7f8647327b4398f36f4aa7e2b77891e2337d4c42aca91a324e2c35c485526c0dea744ab8018fa7c40b75b3129f5480c9ff843378671682eee857857c24ee03a290579f8a3d551ec300dde179eef97eba4320e90b91afa89bb78886b0d8dd901c90df6b22cbdb1b9ae9cc3b88e13434088f37d9a14de78c62ec7844ed035d6da17a8a96b46b601e1aa87c1b34c756c366351a70f2ff668378baadaa1d589bf6b20c31d3d0e547aad3f6b727a6d8447e610d35f9cb8ee88336e9136ca0cb216a11339baa9d58ae57f7269eac27234a0f5d134ca32e0608181e15a468954fc766b9c4f531121a8d7b42aaf14679faae7f5c96157f1bb25dea537f3010e982e665e873c2f594b4bf8330378685f0c6e5a4859296dbe1fdb306b3a67294f321c6d53ae03bd6232d04b434b6e3fdab13e90fdd9d7f2ee23e105b2dfcd6d7f424f41ee944424062309c55df2942d121fd0399d07bb0b038d28c4b46c3c09ff06ae3a319858b7f8d89c7c3173ed21a51d29e6cd67812c640ce4bfb392e310672672a49b7161b402fdb340462d24e32c796753526db15cdc1dcb54d59d71f41fbbcec6b7e6e643a9f4ac0f0eee63e77d0a6705dc62bb0bcd489fa4f31ec10bca2733b31b5aadb8a13b699b7ddbd79d700797d87d0a1f8ccfee0ea31c8fc94489bb986da4b2a2c17e817cd5f8a1460966c5af7dd44ea82367d66104a2b80aa10fba489603177b446b36102d4b79146039a5cea3c5b88a534cbcdafac9a41cf0fb820cba10de3a6ae3a1d2d4022cc8146c5593b359c67495b864853627a101207b885465b3c3dd1ac5314073f3d04d28e67540860f0c57c28c3b0e7bf6ebd8c08022271f11956b2f33b8c6b8faa917bb357790cd5e686d1de2c3693fa11337496afb43eac574ab2cad7c0760006bed14395c6f7f4494b4993b7465e12ecba57ca67a59a17c57e6aaffb26fb785e37c88930e52b96aeaf577fcc3ef36cb8676cef50ae369cee9596d378bfa59528fe27a9add6b733c0ed848cd7fb330ca445f256ea6dd72f026b48ad386f0f04ea4507c90fe28ced1f559b2f074eab461a37ce7deef841b9d976be532bb510e440d2b850e93012ea7d67718fc59bf449bdcb0df6cecbc6fb7fe723329d6a25a6c338fde622f22028b44a96d4a442354b65c72516868cbff4fa81a85b6613b3a60d6b568c02570492f141bcfd5eb10e5abe6d25cc015db9f0d4b3cb10ed734417e6f5338cdee7d70783b032a4e0ee932f362d367ee51e5e47c6126d050b30fad8b105311fba88c41c39d6799508e81ba3fcdd86d57889e5d1388b8bbbc4439c2d4c2f9b89c76b4f7a83863ea3728772424c2ec7b8f42498452c3a2ed50994020aab8a71cec1ef1b1d04f16be791c4aadeb359f49a10d8207e59dc3da4581c0f95dee288b9fd5f92fdfa18391a79edac68dbf9870375fc5dfb5b83902a69d84f8a2c48af9f146f5617d59a2392ed25f442d0618f5ac41471d89558f185365f53d1f737a20e604c4397ad68a4221377abee93577189afa9dc7b42e0527eec7191cf6fc65d81618e69f4df7cc815c1865ddf36b77c52208bb7360aa588606e6185b5ec0460c018fb8a057979f886de8d2fee69a604fbbdaa98d4fb3a5e7cc21e3eb5ebb773fbc81043eabf0f6df34d5e9364e8c30ce9a4f0e3f04a1b72dcb9002758a8df6bee3980ead6a6b4b45f7cbbf30aead8379dac396c58c146796a3fee072cd3b7d21f3200fa7edbfe085b0bad8e233e10211173008b6267b7cc33a817c4a18d949d8a6118cc79b9a36fe4eaa62eec5036bcf06f8777687c64c8244175560a90a472c7e8a1830caaa3036c695d34f7e19937f03d5afc44bd7c6dac4282bb1d40f80b3d317b5832c619d5d980696bf827e98e9c6c477b4602f615dc81127c8623ab20816c2c96fbd0ee1f69bd97b7abf72e444c89b338336b9ddfe3cae27aaeb1ef186582437624ad8c355e0c52ab4380f9fb3f8bdff709ec9cbc85e0f433e317579c27fdddc35d2f821f02bef759948d10ce0a8888154e7c576ad406f104a0c04f5f0f30b993d541f718d18db76ad5b5ce9b7d4bf371cf9a71c591c2c0d3ea002e5516858330e00903eb6a48d30d3d5a1a36b72d8048b0813903038bf6764f287f2fdbaa471cc538e15cc52bc3bbc18f146a161446f9f4f5455f343886d36b1bfbb0745baef20aeebb183abbb3b79229685d76ec80f6bf36d9880cf06b67d0726357f9ef4878014619540f60fd616e7735921c0561e9a20f03ce3de5900f3aeaa0a37bfc0f35756e3c109fca3d8b587fbabea67dba27e28f711879420d11e3f4a6bd58abdfdb1dcd9f30cd09cf354b003149ec79f41c1b7daf116bbd6024927b32f85b8bdf77947290cec00d8ce2c74a98d13bd1da59163d81f10b7450b6b95adaa23f88e27cf4bb346d3c5a64d03b683c917f9ae7ff9e8ada677743137d56da268eb468c608fb4982f8a42ee2bf3d90052a02b11e582c2a6770ad788798f8f4ce15fed7716b07cfff3c40622f5b5f022558d4dc9e3766e0bbbe15d5432c5490fb02a3970f2d90b9b994dbe03b91be4353996cadb807c34168155818c2d09b5a0b878f77d6ffc2bd3f2483aa8e8ea5e0a384db0a7abaefc9025d0c1735aefef314cff324c1eba3456ee8a8e4048c6f71a7a103037367b1da2660520520381bfcf272a74800c6c29582dd71d676f5037d3ca6eab3a824888a3b4b835fb4ec76331b6e8b67d226e235537891d519585c8c09df6492f7257a9a887d4fe27a1306727b1a4d5878d629f44cfbbe933c0cbde79f173bf2c125e8829b18381ec503822a809213c3111c9d2ac02863d9ee570e4", 0x1000}, {&(0x7f0000001d40)="a845fdff597f618e99852d5c6952c3d17e0746b87ae396a2f94d21c1609c2d8ae76ecbfd75f3ac3334166d02b9e5134898e6073896df99d4bcd3028e2233c684e9718deb8127f4b679cb41591eca86a1effeea800c72cc26e2b15f02aa580c2b51", 0x61}, {&(0x7f0000001dc0)="10bb042a08a10cdb715108f2f22173fe3c125c788dfc2f73e036d2ae44a1ec6e0f8a493213fb77f985b221c0cb2057e566cf2511c05bcb251745a796f284ebffdac1d8fdded3e577766d53686332bb96aa1ee3aac70c11353bbc52773fd418425e5f3815e21e45442fd2f85db73d86c83b6ab18377d7dd29", 0x78}], 0x7, &(0x7f0000001ec0)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0xfffff001}}, @authinfo={0x18, 0x84, 0x6, {0x9}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x9e87}}, @authinfo={0x18, 0x84, 0x6, {0x101}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}], 0x78, 0x20000000}, 0x4000041) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r5, r3, 0x0, 0x7fffffe7) 03:51:47 executing program 5: r0 = socket(0x36, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x115480, 0x1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r1, 0x4112, 0x0) r2 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r2, 0x80044944, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = pidfd_getfd(r5, r2, 0x0) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x800, 0x282600) ioctl$FBIOPUT_VSCREENINFO(r6, 0x4601, &(0x7f0000000000)={0x2000, 0x40, 0x10, 0x30, 0x7, 0x9, 0x4, 0x0, {0x8000, 0xffffffff}, {0x8, 0x8, 0x1}, {0x7}, {0x6, 0x5f7}, 0x1, 0x100, 0x4, 0x9, 0x1, 0xfffffffd, 0x7, 0xfff, 0x27d5, 0x0, 0x5, 0x2000, 0x57e1c612bea9176f, 0x200, 0x0, 0x6}) [ 674.268323][T20207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:47 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r0, 0x0) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r4) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r5) keyctl$read(0xb, r5, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x80080) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_REQBUFS(r7, 0xc0145608, &(0x7f00000005c0)={0x1a, 0x8, 0x3}) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000540)=[{&(0x7f0000004000)="ac4ffe9559d215b365da1d9c913f96e696528961ccc3ba57dc0790272ef636d29f8d192973e4d52baa6790acd7b61158bee1233ea56ad12b93d08fbb91aa993a8457b8c53c29100349c1350b5b5a40ce081cd99e38ea6e5a4856dc4894b3daa2ff27c470b35ed07f648bce85483a903a861a6404ed5d4b8cfe2a69f122d7ed5744377f5aa0637226a7a4bf4d9c79808a967155b047e609c46d38db4e85f57086bcfb648ccc34d404603dd06c96d62c7c0ff88824ab0485f0a8d2cb52e63d278ea80a0931ae650cd6b50836e7762f645ff924801c0724cbab9fe7a49c69476abc88f11e5d1d503811fbb52482c7501f5cb65a93143c2a45282ff5d507467982bbcd229ec3a2203ec4b15f9103a21475efd0e2c04de51406b2cd1d088e5c6b2f88cea2e6383561f2df00000200000000000000", 0x132}, {&(0x7f00000001c0)="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", 0xff}, {&(0x7f00000002c0)="ac4a30b70628bfa4417e61c8d7c29a6af58187af8d16eab0addc1f26f65a5b4f316462964685dd141a90a316279ec388fd6aa80ca5182db6c99dee45394d49081f015f699241bff881ac53cd3b1609eb5583b870c3c2407a8c5628967cc6afe3c3eb831a62d2412e3af90928050573396ac93c9ef235e9200dc2bf08844908f9b2", 0x81}, {&(0x7f0000000140)="5c3a531b8bad2fc7e9372faee27c2aa04fd3a0fcc5962952ae6f7720e09f5e7977055ae43f6c014035b3a74787de", 0x2e}, {&(0x7f0000000380)="3416beca917204004f815cf5fc1a5c68dfa689da2d1ee80fe5b5f1a7b59f15e75321f6dca649fb75fcde662dbbc6dc3a716433de028ac7b443e5d39806fef0d715119daa9336b796fd3de32b340c7af89593376345bba5834f26224e99945e73aa877a6e2ee72d37c089698003f3f1b11f10c60f73857041eafc316200000400"/138, 0x8a}, {&(0x7f0000000440)="b92e01159fe9b22e29bb790e51a946df6ef53fbfbecff0091be4cd8be288201cdf022db9d7f5981810ce65ca2ecdf7ebf54005ed14919ef6a8b6a9d3087b82d72eb9ab2cfb9e258785cc24cb55c510453119870dca1403b5508355684128adc267374a7b9cff8ab4d4e5cc6e9f89eeafbfbe127e670ff766656e735ffc204a27c4394a3fbc9221c5a2e0c981da7c44624dce336fd7bf6c6da5ccf5ddbcc6085c2477ebfdbf9b4664f3f09d8f6a10e62904bdcf1387c2fdcb5e14f0c013eebff627d9a08babe51329044a6e65c1ecf72c6280e9fce9be88ac", 0xd8}], 0x6, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x10) process_vm_readv(0x0, &(0x7f0000001b00)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/73, 0x49}, {&(0x7f0000001680)=""/238, 0xee}, {&(0x7f0000001780)=""/146, 0x92}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/152, 0x98}, {&(0x7f0000001a00)=""/244, 0xf4}], 0x7, &(0x7f0000003f40)=[{&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000002b80)=""/141, 0x8d}, {&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/62, 0x3e}, {&(0x7f0000003c80)=""/77, 0x4d}, {&(0x7f0000003d00)=""/175, 0xaf}, {&(0x7f0000003dc0)=""/125, 0x7d}, {&(0x7f0000003e40)=""/174, 0xae}, {&(0x7f0000003f00)=""/51, 0x33}], 0x9, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:47 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000040)={0x2, 0x3f6a, 0x1, 0x300}) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x0, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:48 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x47a102, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000280)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x25, 0x5, 0x3, 0xd9db, 0x80000001, 0x9ce7, "3d903c83c8ed662cb58bae6157a55e11784c129be54d5fea240871c3937357b85d3aa31a35"}}, 0x13d) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r5}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r7, 0x105, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x4c, 0x18, {0x7d0, @media='udp\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r7, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x18, 0x18, {0x200, @bearer=@l2={'ib', 0x3a, 'netdevsim0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x44004) [ 675.102037][T20255] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 675.324220][T20259] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:51:48 executing program 1: r0 = socket(0x22, 0x2, 0x2) getpeername$inet(r0, 0x0, 0x0) sendmsg$can_j1939(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)="c34138ecb9b037f55a8c7ed14006c72741f33d66523546d5814006f59e72b3b0a0bb52d13189e0a171c985a8de734e335bde296d5f9b81ad385fd9850fc903344d39debeeeb630645980302ef39f9263c7f4b66e03297ad8fe4f4ab2188624703bb930269fb8b249d06612181afcc531adbf9d11e54508688220337a8d2d5929708feb4e1f933cafdb5e82d23aea1f70b6169075817434afeb9fe28d76112b512f83ac15873366267576889d14a8d6ba1687f3c3ff28550b59d4eb6a93b89964f0ca87bf7160f65e", 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x2000c000) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x0, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:48 executing program 1: open(0x0, 0x725401, 0x40) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x8) 03:51:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 675.925995][T20278] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:49 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@ldst={0x6, 0x1, 0x5, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000040)={0x18}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) getpeername$unix(r7, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) dup3(r5, r6, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) 03:51:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x0, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:49 executing program 1: open(0x0, 0x400182, 0x80) fchdir(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r1, r0, 0x80000) 03:51:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:49 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_get$uid(0x3, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x800, 0x101400) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r7) write$P9_RGETATTR(r5, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x800, {0x8, 0x3, 0x4}, 0x44, r1, r7, 0x0, 0x0, 0x7ff, 0x4, 0xfffffffffffffffd, 0xfffffffffffffeff, 0x200, 0x7fffffff, 0x0, 0x9, 0x8, 0x9, 0x64, 0x7e, 0x80000000}}, 0xa0) [ 676.674400][T20305] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:50 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x188401, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x0) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:50 executing program 1: r0 = open(0x0, 0xc0e40, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f0000000000)) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x0, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 677.625207][T20331] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:50 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000240)={r0, 0xa}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f00000004c0)={0x1, &(0x7f0000000280)=[{}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000100)={0x0, 0xeaa30a0636a230da}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000000)={r0, 0x1}) r3 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r3, 0x80044944, 0x0) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000000c0)={r7}, 0xc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=r7, @ANYBLOB="bd000000c5f90a9d448311de934bb3b47d4383a7124da7ccb9f50ef75e64c79cd0de20ea619b8fbc6db582d7822c670973c8b1d3e37f331a9fc867be1134adf6ced41a39cf9a842cb3192f6d99b9402a21b461b310a47642d6152f267fa3dee821bd1d8af4121997873154f59bedc9b3c64f65c133005167982941214e2c60eebdaa1982c6edaf6d453fd69a670f43b1a0c31574edd6843cfb87d9cb0ca1bef0b6e3205a192d2620c05ab596d9d0215ece152e16a73e80a73587d2b3d7cdc7c1af87"], &(0x7f0000000040)=0xc5) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000080)={r8, 0x7fffffff}, 0x8) 03:51:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r6, 0xc0096616, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) fsetxattr(r7, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)='keyringem1\'Nvmnet1self\x00', 0x17, 0x6) 03:51:51 executing program 1: r0 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x41, 0x3, 0x2}, 0x10) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/partitions\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 677.901308][ T27] kauditd_printk_skb: 32 callbacks suppressed [ 677.901321][ T27] audit: type=1800 audit(1584762711.149:1259): pid=20351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16745 res=0 03:51:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:51 executing program 5: r0 = socket(0x1d, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) keyctl$read(0xb, r1, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r1, 0x1000, 0x1000}, &(0x7f0000000040)={'enc=', 'pkcs1', ' hash=', {'wp256-generic\x00'}}, &(0x7f00000000c0)="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", &(0x7f00000010c0)=""/4096) [ 677.959950][ T27] audit: type=1800 audit(1584762711.199:1260): pid=20348 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=234 res=0 [ 678.041191][ T27] audit: type=1804 audit(1584762711.289:1261): pid=20348 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir239122750/syzkaller.wO0fIj/192/file0/file0" dev="loop2" ino=234 res=1 03:51:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x0) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:51 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x84, &(0x7f00000001c0)=""/132}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x8, 0x7fffffff, 0xffffffff, 0x8}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x44000, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/mdstat\x00', 0x0, 0x0) dup3(r6, r5, 0x0) sendfile(r4, r5, 0x0, 0x7fffffa7) [ 678.229616][T20342] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 678.249242][ T27] audit: type=1800 audit(1584762711.329:1262): pid=20353 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16681 res=0 03:51:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 678.352396][ T27] audit: type=1804 audit(1584762711.349:1263): pid=20353 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/92/file0" dev="sda1" ino=16681 res=1 [ 678.580923][ T27] audit: type=1804 audit(1584762711.429:1264): pid=20342 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/6/file0/file0" dev="sda1" ino=16745 res=1 [ 678.623484][ T27] audit: type=1800 audit(1584762711.779:1265): pid=20370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16716 res=0 [ 678.700206][T20374] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:52 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r4}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x210000, 0x180) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x14, r6, 0xdaa3b002485c5b6d, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x2a4, r6, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x40, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x41}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x401}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_BEARER={0x120, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8be}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x84}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x87}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe09d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x914}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}]}, 0x2a4}, 0x1, 0x0, 0x0, 0x48040}, 0x48000) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) [ 678.824981][ T27] audit: type=1804 audit(1584762711.789:1266): pid=20370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/93/file0" dev="sda1" ino=16716 res=1 03:51:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x0, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 678.961182][ T27] audit: type=1800 audit(1584762711.899:1267): pid=20374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=235 res=0 [ 679.056907][T20379] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:51:52 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x6202) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0010000000000000180012800800010070707076c4c788def1000c00028008000100fbb99df0f180308e49e03c22561d522004b6c306ef322b4b53ad4bed6ee2fd450eaadc211a5a30e542d6c4255cbc8303614209e7b45d8feefae7df0ceb90f83372abdd4fc98b890d19a4cf7144c0b4ec1fc425ac3cb7a39b86206493739ff69e3834353091709ab0c9343ff6b88c2af7ce192461de66ee", @ANYRES32=r2, @ANYBLOB="08001f0000000000"], 0x40}}, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000000)) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$fb(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x810, r5, 0x82000) dup3(r4, r3, 0x0) sendfile(r0, r3, 0x0, 0x7fffffa7) [ 679.108394][ T27] audit: type=1804 audit(1584762711.929:1268): pid=20374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/69/file0/file0" dev="loop0" ino=235 res=1 03:51:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x0) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 679.389816][T20396] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 679.442391][T20396] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 03:51:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 679.637871][T20404] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 679.761872][T20404] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 679.852657][T20393] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 679.887549][T20408] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:53 executing program 1: r0 = open(0x0, 0x4000, 0xd0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000000)={r1, 0x1, 0x3ff, "cc7ecc6cbb7a24743836500431d693011889ef2b50950d8b5889edab0dfde6be36d78620dd51537b760b886650c69de8e48c45e8a9cd356f32ade761f4a9fc3a2cffaab1a52611362541e1afe4bfb8f7"}) fchdir(0xffffffffffffffff) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r4, r3, 0x0) sendfile(r2, r3, 0x0, 0x7fffffa7) [ 679.973458][T20415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:51:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 682.273839][ T0] NOHZ: local_softirq_pending 08 03:51:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x0, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:57 executing program 1: open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0xbbae72c2e0986fb7) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) dup3(r2, r1, 0x0) sendfile(r0, r1, 0x0, 0x7fffffa7) 03:51:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)={0x5, 0x1a, 0x7, 0x0, 0x0, [{{r0}, 0x2}, {{r2}, 0x2}, {{r4}, 0x7}, {{r5}, 0x7}, {{r2}, 0xfffffffffffffffe}, {{r3}}, {{r6}, 0x6}]}) write$tun(r1, &(0x7f0000000180)={@void, @val={0x5}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x381c, 0x0, 0x0, 0x0, 0x84, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0x2, "3237fb"}}}}}, 0xfdef) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 03:51:57 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, @phonet={0x23, 0x2, 0x3, 0x8}, @sco={0x1f, @fixed={[], 0x10}}, @ipx={0x4, 0x5, 0x1, "d0643c7b46b2", 0x7}, 0xb7b8, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)='veth1_to_team\x00', 0xfffffffffffffffd, 0x4, 0x3b}) r2 = socket(0x22, 0x2, 0x2) getpeername$inet(r2, 0x0, 0x0) r3 = socket(0x22, 0x2, 0x2) getpeername$inet(r3, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @multicast1}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={@loopback, @rand_addr="c24c86b4f56b371c73b31e309339fe4f", @loopback, 0x6, 0x5f, 0x4, 0x400, 0x401, 0x80188, r4}) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/18, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 684.251167][ T27] kauditd_printk_skb: 14 callbacks suppressed [ 684.251187][ T27] audit: type=1800 audit(1584762717.499:1283): pid=20441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16762 res=0 03:51:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)={0x5, 0x1a, 0x7, 0x0, 0x0, [{{r0}, 0x2}, {{r2}, 0x2}, {{r4}, 0x7}, {{r5}, 0x7}, {{r2}, 0xfffffffffffffffe}, {{r3}}, {{r6}, 0x6}]}) write$tun(r1, &(0x7f0000000180)={@void, @val={0x5}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x381c, 0x0, 0x0, 0x0, 0x84, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0x2, "3237fb"}}}}}, 0xfdef) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 684.449680][ T27] audit: type=1804 audit(1584762717.539:1284): pid=20441 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir348160901/syzkaller.RUwuZp/97/file0" dev="sda1" ino=16762 res=1 [ 684.545748][ T27] audit: type=1800 audit(1584762717.599:1285): pid=20447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=238 res=0 [ 684.581842][ T27] audit: type=1804 audit(1584762717.629:1286): pid=20447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/71/file0/file0" dev="loop0" ino=238 res=1 [ 684.651866][T20447] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 684.732326][ T27] audit: type=1800 audit(1584762717.869:1287): pid=20444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16771 res=0 03:51:58 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth0_virt_wifi\x00', {0x2, 0x4e23, @multicast1}}) r1 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r1, 0x80044944, 0x0) [ 684.781836][T20444] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 684.859473][ T27] audit: type=1804 audit(1584762717.949:1288): pid=20444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/8/file0/file0" dev="sda1" ino=16771 res=1 03:51:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/18, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 685.476731][ T2952] aoe: packet could not be sent on ipvlan1. consider increasing tx_queue_len 03:51:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:58 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="000129bd7000ffdbdf25060000000800040000000000080004000300000006000b000100000008000c0002000000080002000300000008000700ac1e010106000b001f00000008000800ac1414bb"], 0x3}, 0x1, 0x0, 0x0, 0x801}, 0x40800) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0xf3314cb83a0e5aa7) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 685.749733][ T27] audit: type=1800 audit(1584762718.999:1289): pid=20488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=239 res=0 03:51:59 executing program 5: r0 = socket(0x16, 0x80000, 0x7) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 685.894983][ T27] audit: type=1804 audit(1584762719.039:1290): pid=20488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/72/file0/file0" dev="loop0" ino=239 res=1 [ 686.363839][T20488] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:51:59 executing program 3 (fault-call:10 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:51:59 executing program 5: ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, 0x0) 03:51:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/18, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r1, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:51:59 executing program 5: r0 = socket(0x1e, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:51:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 686.818859][ T27] audit: type=1800 audit(1584762720.069:1291): pid=20523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16761 res=0 [ 686.943896][T20523] FAULT_INJECTION: forcing a failure. [ 686.943896][T20523] name failslab, interval 1, probability 0, space 0, times 0 [ 687.011773][ T27] audit: type=1804 audit(1584762720.159:1292): pid=20526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/9/file0" dev="sda1" ino=16761 res=1 [ 687.041684][T20523] CPU: 1 PID: 20523 Comm: syz-executor.3 Not tainted 5.6.0-rc6-syzkaller #0 [ 687.050375][T20523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.060524][T20523] Call Trace: [ 687.063864][T20523] dump_stack+0x188/0x20d [ 687.068228][T20523] should_fail.cold+0x5/0xa [ 687.072751][T20523] ? fault_create_debugfs_attr+0x140/0x140 [ 687.078579][T20523] should_failslab+0x5/0xf [ 687.083005][T20523] kmem_cache_alloc_trace+0x2d0/0x7d0 [ 687.088393][T20523] ? __lock_acquire+0x80b/0x3ca0 [ 687.093349][T20523] alloc_pipe_info+0x10a/0x4f0 [ 687.098127][T20523] splice_direct_to_actor+0x771/0x980 [ 687.103499][T20523] ? __inode_security_revalidate+0xf0/0x140 [ 687.109411][T20523] ? avc_policy_seqno+0x9/0x70 [ 687.114165][T20523] ? generic_pipe_buf_nosteal+0x10/0x10 [ 687.119698][T20523] ? selinux_file_permission+0x92/0x560 [ 687.125236][T20523] ? do_splice_to+0x160/0x160 [ 687.129898][T20523] ? security_file_permission+0x8a/0x370 [ 687.135531][T20523] do_splice_direct+0x1a8/0x270 [ 687.140373][T20523] ? splice_direct_to_actor+0x980/0x980 [ 687.145923][T20523] ? __this_cpu_preempt_check+0x28/0x190 [ 687.151550][T20523] do_sendfile+0x549/0xc40 [ 687.155982][T20523] ? do_compat_pwritev64+0x1b0/0x1b0 [ 687.161301][T20523] ? wait_for_completion+0x3c0/0x3c0 [ 687.166585][T20523] ? vfs_write+0x15b/0x5c0 [ 687.170996][T20523] __x64_sys_sendfile64+0x1cc/0x210 [ 687.176183][T20523] ? ksys_write+0x19f/0x250 [ 687.180668][T20523] ? __ia32_sys_sendfile+0x220/0x220 [ 687.185937][T20523] ? __ia32_sys_clock_settime+0x260/0x260 [ 687.191671][T20523] ? trace_hardirqs_off_caller+0x55/0x230 [ 687.197391][T20523] do_syscall_64+0xf6/0x7d0 [ 687.201885][T20523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.207758][T20523] RIP: 0033:0x45c849 [ 687.211650][T20523] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.231239][T20523] RSP: 002b:00007f585dc3cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 687.239643][T20523] RAX: ffffffffffffffda RBX: 00007f585dc3d6d4 RCX: 000000000045c849 [ 687.247599][T20523] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 687.255563][T20523] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 687.263523][T20523] R10: 000000007fffffa7 R11: 0000000000000246 R12: 0000000000000009 [ 687.271481][T20523] R13: 00000000000008d0 R14: 00000000004cb74a R15: 0000000000000000 [ 687.732675][T20532] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:01 executing program 1 (fault-call:14 fault-nth:0): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:01 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) recvfrom$packet(r1, &(0x7f0000000000)=""/37, 0x25, 0x2, 0x0, 0x0) 03:52:01 executing program 3 (fault-call:10 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 688.114670][T20554] FAULT_INJECTION: forcing a failure. [ 688.114670][T20554] name failslab, interval 1, probability 0, space 0, times 0 [ 688.131328][T20561] FAULT_INJECTION: forcing a failure. [ 688.131328][T20561] name failslab, interval 1, probability 0, space 0, times 0 03:52:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 688.215448][T20561] CPU: 0 PID: 20561 Comm: syz-executor.1 Not tainted 5.6.0-rc6-syzkaller #0 [ 688.224172][T20561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.234238][T20561] Call Trace: [ 688.237549][T20561] dump_stack+0x188/0x20d [ 688.241909][T20561] should_fail.cold+0x5/0xa [ 688.246436][T20561] ? lock_downgrade+0x7f0/0x7f0 [ 688.251309][T20561] ? fault_create_debugfs_attr+0x140/0x140 [ 688.257148][T20561] should_failslab+0x5/0xf [ 688.261583][T20561] kmem_cache_alloc_node+0x25c/0x760 [ 688.266926][T20561] __alloc_skb+0xba/0x5a0 [ 688.271271][T20561] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 688.276845][T20561] ? netlink_autobind.isra.0+0x21b/0x300 [ 688.282490][T20561] netlink_sendmsg+0x97b/0xe10 [ 688.287267][T20561] ? netlink_unicast+0x740/0x740 [ 688.292220][T20561] ? netlink_unicast+0x740/0x740 [ 688.297177][T20561] sock_sendmsg+0xcf/0x120 [ 688.301602][T20561] ____sys_sendmsg+0x6b9/0x7d0 [ 688.306379][T20561] ? kernel_sendmsg+0x50/0x50 [ 688.311087][T20561] ___sys_sendmsg+0x100/0x170 [ 688.315777][T20561] ? sendmsg_copy_msghdr+0x70/0x70 [ 688.320915][T20561] ? __fget_files+0x329/0x4f0 [ 688.325613][T20561] ? ksys_dup3+0x3c0/0x3c0 [ 688.330042][T20561] ? find_held_lock+0x2d/0x110 [ 688.334813][T20561] ? vfs_write+0x342/0x5c0 [ 688.339252][T20561] ? __fget_light+0x208/0x270 [ 688.343945][T20561] __sys_sendmsg+0xec/0x1b0 [ 688.348453][T20561] ? __sys_sendmsg_sock+0xb0/0xb0 [ 688.353482][T20561] ? vfs_write+0x15b/0x5c0 [ 688.357914][T20561] ? trace_hardirqs_off_caller+0x55/0x230 [ 688.363640][T20561] ? do_syscall_64+0x21/0x7d0 [ 688.368324][T20561] do_syscall_64+0xf6/0x7d0 [ 688.372837][T20561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.378740][T20561] RIP: 0033:0x45c849 [ 688.382642][T20561] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.402244][T20561] RSP: 002b:00007f7d2448ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 688.410660][T20561] RAX: ffffffffffffffda RBX: 00007f7d2448b6d4 RCX: 000000000045c849 [ 688.418630][T20561] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 688.426604][T20561] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 688.434577][T20561] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 688.442555][T20561] R13: 00000000000009f8 R14: 00000000004ccb00 R15: 0000000000000000 03:52:01 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0984124, &(0x7f0000000040)) 03:52:02 executing program 5: r0 = socket(0x29, 0x2, 0x2) r1 = getpgid(0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @remote}, 0x4, 0x4, 0x3, 0x3}}, 0x26) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x18040, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x2, 0x2, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(r1) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) 03:52:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:02 executing program 1 (fault-call:14 fault-nth:1): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 688.782432][T20554] CPU: 0 PID: 20554 Comm: syz-executor.3 Not tainted 5.6.0-rc6-syzkaller #0 [ 688.791154][T20554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.801217][T20554] Call Trace: [ 688.804523][T20554] dump_stack+0x188/0x20d [ 688.808871][T20554] should_fail.cold+0x5/0xa [ 688.813393][T20554] ? fault_create_debugfs_attr+0x140/0x140 [ 688.819227][T20554] should_failslab+0x5/0xf [ 688.823655][T20554] __kmalloc+0x2d9/0x7a0 [ 688.827907][T20554] ? kmem_cache_alloc_trace+0x390/0x7d0 [ 688.833456][T20554] ? alloc_pipe_info+0x1e0/0x4f0 [ 688.838416][T20554] alloc_pipe_info+0x1e0/0x4f0 [ 688.843202][T20554] splice_direct_to_actor+0x771/0x980 [ 688.848594][T20554] ? __inode_security_revalidate+0xf0/0x140 [ 688.854606][T20554] ? avc_policy_seqno+0x9/0x70 [ 688.859379][T20554] ? generic_pipe_buf_nosteal+0x10/0x10 [ 688.864927][T20554] ? selinux_file_permission+0x92/0x560 [ 688.870490][T20554] ? do_splice_to+0x160/0x160 [ 688.875175][T20554] ? security_file_permission+0x8a/0x370 [ 688.880827][T20554] do_splice_direct+0x1a8/0x270 [ 688.885696][T20554] ? splice_direct_to_actor+0x980/0x980 [ 688.891266][T20554] ? __this_cpu_preempt_check+0x28/0x190 [ 688.896921][T20554] do_sendfile+0x549/0xc40 [ 688.901363][T20554] ? do_compat_pwritev64+0x1b0/0x1b0 [ 688.906668][T20554] ? wait_for_completion+0x3c0/0x3c0 [ 688.911965][T20554] ? vfs_write+0x15b/0x5c0 [ 688.916401][T20554] __x64_sys_sendfile64+0x1cc/0x210 [ 688.921613][T20554] ? ksys_write+0x19f/0x250 [ 688.926124][T20554] ? __ia32_sys_sendfile+0x220/0x220 [ 688.931441][T20554] ? __ia32_sys_clock_settime+0x260/0x260 [ 688.937174][T20554] ? trace_hardirqs_off_caller+0x55/0x230 [ 688.942934][T20554] do_syscall_64+0xf6/0x7d0 [ 688.947500][T20554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.953421][T20554] RIP: 0033:0x45c849 [ 688.957325][T20554] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.976937][T20554] RSP: 002b:00007f585dc5dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 688.985366][T20554] RAX: ffffffffffffffda RBX: 00007f585dc5e6d4 RCX: 000000000045c849 [ 688.993342][T20554] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 688.994227][T20577] FAULT_INJECTION: forcing a failure. [ 688.994227][T20577] name failslab, interval 1, probability 0, space 0, times 0 [ 689.001314][T20554] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 689.001323][T20554] R10: 000000007fffffa7 R11: 0000000000000246 R12: 0000000000000008 [ 689.001330][T20554] R13: 00000000000008d0 R14: 00000000004cb74a R15: 0000000000000001 [ 689.094355][T20580] FAULT_INJECTION: forcing a failure. [ 689.094355][T20580] name failslab, interval 1, probability 0, space 0, times 0 [ 689.177058][T20580] CPU: 0 PID: 20580 Comm: syz-executor.2 Not tainted 5.6.0-rc6-syzkaller #0 [ 689.185836][T20580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.195896][T20580] Call Trace: [ 689.199200][T20580] dump_stack+0x188/0x20d [ 689.203565][T20580] should_fail.cold+0x5/0xa [ 689.208104][T20580] ? fault_create_debugfs_attr+0x140/0x140 [ 689.213944][T20580] should_failslab+0x5/0xf [ 689.218479][T20580] __kmalloc+0x2d9/0x7a0 [ 689.222735][T20580] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 689.228734][T20580] ? tomoyo_realpath_from_path+0xc2/0x620 [ 689.234481][T20580] ? avc_ss_reset+0x180/0x180 [ 689.239178][T20580] tomoyo_realpath_from_path+0xc2/0x620 [ 689.244736][T20580] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 689.250388][T20580] tomoyo_path_number_perm+0x1c2/0x4d0 [ 689.255856][T20580] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 689.261499][T20580] ? tomoyo_execute_permission+0x470/0x470 [ 689.267360][T20580] ? selinux_file_mprotect+0x610/0x610 [ 689.272834][T20580] ? __fget_files+0x329/0x4f0 [ 689.277532][T20580] ? ksys_dup3+0x3c0/0x3c0 [ 689.281958][T20580] ? vfs_write+0x15b/0x5c0 [ 689.286390][T20580] security_file_ioctl+0x6c/0xb0 [ 689.291345][T20580] ksys_ioctl+0x50/0x180 [ 689.295604][T20580] __x64_sys_ioctl+0x6f/0xb0 [ 689.300199][T20580] ? lockdep_hardirqs_on+0x417/0x5d0 [ 689.305503][T20580] do_syscall_64+0xf6/0x7d0 [ 689.310024][T20580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.315917][T20580] RIP: 0033:0x45c849 [ 689.319816][T20580] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.339420][T20580] RSP: 002b:00007f20567a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.347828][T20580] RAX: ffffffffffffffda RBX: 00007f20567a86d4 RCX: 000000000045c849 [ 689.355797][T20580] RDX: 0000000020000040 RSI: 00000000c0984124 RDI: 0000000000000003 [ 689.363770][T20580] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 03:52:02 executing program 5: r0 = socket(0x3, 0x3, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 689.371750][T20580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 689.379723][T20580] R13: 0000000000000203 R14: 00000000004c4253 R15: 0000000000000000 [ 689.392813][T20580] ERROR: Out of memory at tomoyo_realpath_from_path. [ 689.405442][T20564] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 689.432630][T20577] CPU: 1 PID: 20577 Comm: syz-executor.1 Not tainted 5.6.0-rc6-syzkaller #0 [ 689.441344][T20577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.451406][T20577] Call Trace: [ 689.454710][T20577] dump_stack+0x188/0x20d [ 689.459061][T20577] should_fail.cold+0x5/0xa [ 689.463573][T20577] ? lock_downgrade+0x7f0/0x7f0 [ 689.468435][T20577] ? fault_create_debugfs_attr+0x140/0x140 [ 689.474273][T20577] should_failslab+0x5/0xf [ 689.478698][T20577] kmem_cache_alloc_node_trace+0x27c/0x790 [ 689.484521][T20577] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 689.490521][T20577] __kmalloc_node_track_caller+0x38/0x60 [ 689.496162][T20577] __kmalloc_reserve.isra.0+0x39/0xe0 [ 689.501550][T20577] __alloc_skb+0xef/0x5a0 [ 689.505893][T20577] ? __kmalloc_reserve.isra.0+0xe0/0xe0 [ 689.511448][T20577] ? netlink_autobind.isra.0+0x21b/0x300 [ 689.517085][T20577] netlink_sendmsg+0x97b/0xe10 [ 689.521931][T20577] ? netlink_unicast+0x740/0x740 [ 689.526888][T20577] ? netlink_unicast+0x740/0x740 [ 689.531838][T20577] sock_sendmsg+0xcf/0x120 [ 689.536260][T20577] ____sys_sendmsg+0x6b9/0x7d0 [ 689.541036][T20577] ? kernel_sendmsg+0x50/0x50 [ 689.545752][T20577] ___sys_sendmsg+0x100/0x170 [ 689.550443][T20577] ? sendmsg_copy_msghdr+0x70/0x70 [ 689.555583][T20577] ? __fget_files+0x329/0x4f0 [ 689.560275][T20577] ? ksys_dup3+0x3c0/0x3c0 [ 689.564686][T20577] ? find_held_lock+0x2d/0x110 [ 689.569457][T20577] ? vfs_write+0x342/0x5c0 [ 689.573883][T20577] ? __fget_light+0x208/0x270 [ 689.578583][T20577] __sys_sendmsg+0xec/0x1b0 [ 689.583097][T20577] ? __sys_sendmsg_sock+0xb0/0xb0 [ 689.588137][T20577] ? vfs_write+0x15b/0x5c0 [ 689.592576][T20577] ? trace_hardirqs_off_caller+0x55/0x230 [ 689.598304][T20577] ? do_syscall_64+0x21/0x7d0 [ 689.602992][T20577] do_syscall_64+0xf6/0x7d0 [ 689.607505][T20577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.613392][T20577] RIP: 0033:0x45c849 [ 689.617289][T20577] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.636892][T20577] RSP: 002b:00007f7d24469c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 689.645306][T20577] RAX: ffffffffffffffda RBX: 00007f7d2446a6d4 RCX: 000000000045c849 [ 689.653280][T20577] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 689.661254][T20577] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 689.669224][T20577] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b 03:52:02 executing program 5: seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r0 = socket(0x5, 0x2, 0x8001) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) [ 689.677192][T20577] R13: 00000000000009f8 R14: 00000000004ccb00 R15: 0000000000000001 03:52:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/19, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 689.726785][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 689.726798][ T27] audit: type=1326 audit(1584762722.979:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=20591 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 03:52:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:03 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0984124, &(0x7f0000000040)) [ 690.090768][T20605] FAULT_INJECTION: forcing a failure. [ 690.090768][T20605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.104019][T20605] CPU: 1 PID: 20605 Comm: syz-executor.2 Not tainted 5.6.0-rc6-syzkaller #0 [ 690.112696][T20605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.122761][T20605] Call Trace: [ 690.126065][T20605] dump_stack+0x188/0x20d [ 690.130412][T20605] should_fail.cold+0x5/0xa [ 690.134936][T20605] ? fault_create_debugfs_attr+0x140/0x140 [ 690.140826][T20605] __alloc_pages_nodemask+0x17a/0x820 [ 690.146210][T20605] ? find_held_lock+0x2d/0x110 [ 690.150993][T20605] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 690.156759][T20605] cache_grow_begin+0x8c/0xc30 [ 690.161536][T20605] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 690.167007][T20605] __kmalloc+0x6d6/0x7a0 [ 690.171259][T20605] ? tomoyo_realpath_from_path+0xc2/0x620 [ 690.176991][T20605] ? avc_ss_reset+0x180/0x180 [ 690.181697][T20605] tomoyo_realpath_from_path+0xc2/0x620 [ 690.187246][T20605] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 690.192895][T20605] tomoyo_path_number_perm+0x1c2/0x4d0 [ 690.198356][T20605] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 690.204003][T20605] ? tomoyo_execute_permission+0x470/0x470 [ 690.209869][T20605] ? selinux_file_mprotect+0x610/0x610 [ 690.215338][T20605] ? __fget_files+0x329/0x4f0 [ 690.220035][T20605] ? ksys_dup3+0x3c0/0x3c0 [ 690.224459][T20605] ? vfs_write+0x15b/0x5c0 [ 690.228889][T20605] security_file_ioctl+0x6c/0xb0 [ 690.233847][T20605] ksys_ioctl+0x50/0x180 [ 690.238104][T20605] __x64_sys_ioctl+0x6f/0xb0 [ 690.242709][T20605] ? lockdep_hardirqs_on+0x417/0x5d0 [ 690.248006][T20605] do_syscall_64+0xf6/0x7d0 [ 690.252526][T20605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.258422][T20605] RIP: 0033:0x45c849 [ 690.262324][T20605] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.281949][T20605] RSP: 002b:00007f20567a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.290372][T20605] RAX: ffffffffffffffda RBX: 00007f20567a86d4 RCX: 000000000045c849 [ 690.298353][T20605] RDX: 0000000020000040 RSI: 00000000c0984124 RDI: 0000000000000003 [ 690.306328][T20605] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 690.314302][T20605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 690.322278][T20605] R13: 0000000000000203 R14: 00000000004c4253 R15: 0000000000000001 03:52:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:03 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 690.382628][T20608] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 690.527858][ T27] audit: type=1326 audit(1584762723.779:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=20591 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 03:52:03 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r4}, 0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={r4, 0x80}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={r5, 0x1000, "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"}, &(0x7f00000010c0)=0x1008) 03:52:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 690.802646][ T166] tipc: TX() has been purged, node left! 03:52:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 691.191383][ T27] audit: type=1800 audit(1584762724.439:1301): pid=20646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=241 res=0 03:52:04 executing program 5: r0 = socket(0x22, 0x2, 0x2) ioctl$IMGETDEVINFO(r0, 0x80044944, 0x0) r1 = socket(0x22, 0x2, 0x2) getpeername$inet(r1, 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f00000017c0)=[{&(0x7f0000000080)={0x27, 0x1, 0x2, 0x4, 0x81, 0x0, "60703911c2ce871044c809b4079ddf88ee3cf8f8f78d24e3b87415f221df3494b6d37e9be41b2e31144ccaea3e2c112fbadbc3166874b7667fdc7eee474f31", 0x81}, 0x60, &(0x7f0000001380)=[{&(0x7f0000000100)="cfac596fc521d9f5657bbe5553803ce2b24ce2e16f94153a3ef84365b4f01bb698042073e91f5d36a75cfb6be1b5e746d0be7eea732c83ce4433fb178ad5", 0x3e}, {&(0x7f0000000140)="8f9fdb5f75e302d34e92a6416b2d3ffee7744f516b0483ab617664f5d608b9e71a92f670534f497532afea6544f30bb7c5773cd32e872b391ebe83e8442df36afe4519612ca0c5d1e3eaf120f41fcf0eba9fdc660bf4b1ac3aa668360665cbe40fbc1b2fdd80d152f8d5f8d2a0e2cf84e224ba54818218492ede0519fa25871e52710204741d62d4fc9dbbd0", 0x8c}, {&(0x7f0000000200)="5c4b774cbb5f137702aa31d70a4b76a70b4c2223727a141c490f32342e7cc11b9ff88ff465b556394c8937c118ca94562d3f72014cec56b784f02daabcf339cd7949336ade0af0f12258810ff12a18853e1660d19bee8727e3844b1a73ab132b84427763ae9ded002ccabb57f8bfd5c8c4069bacc490cfe9bac26c544782329738d36c0ca6df904f898d5fc08345a8c308d5840de0c5d15f03eaceab8d3bd082cc6a18c779d7c96a09e07178690e7bb1b74e74e056249becdb3ce7e9284094c396b22d0524d394ecfeb62c0bff563372540775ac970b9ffa4a00552b30c6fae8710e1cc8a2278efdba4a78d3e5e3", 0xee}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="5bd764f851ae2c2ca47733664838c9e061a612d113d59bd40ad8f1f1ebf8d033364f5fa4678b40c347094ab60d2b2dbbc78f9bf42fc0e864a774731aa5c934b9752afd088cd32d2a3ebf29a3659a92669f84c45570169838e72a70a9cdfe1af8205a325972851297bfff37cf1667fd624d5964c629027416c36b52", 0x7b}], 0x5, 0x0, 0x0, 0x20000080}, {&(0x7f0000001400)={0x27, 0x0, 0x2, 0x6, 0x1f, 0x8, "d775cead11b6bdcef2abd46f7e3d82c56eb5e48c272a4dbeeff4f2f31bf3e7d2020aaf9ffb59edddd1fc50955693f54c4b404c01e84ae05c158f92376588c6", 0x37}, 0x60, &(0x7f0000001680)=[{&(0x7f0000001480)="b2cb170e0c129b76ecb9d7a9194d4264663dbbbdb3b315883e70681877c1e251c32fb8a4a9cabc658957071709cd43de9ca95473334007a16c16b14b84f61c2ed722072a1ce8ae44d21d354ecae7c0aa17da006959fd999c924b495b6658f130def1bb398131dba6de01c3d80e1c77f9", 0x70}, {&(0x7f0000001500)="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", 0xfc}, {&(0x7f0000001600)="a0e76526a90e0c27398db86fc28acb09ed97de36907b20a952231518d1a494bec3c95f4c3fa01a2d8c3aba10c044a647", 0x30}, {&(0x7f0000001640)="df3f904897f7cd1881b9b78921303b7e4e848c3fef5109ec5ec6c3724f28be1bb690164c9a63450c4a09e12640534a564242a928dc94e8f3", 0x38}], 0x4, &(0x7f00000016c0)={0xc8, 0x29, 0x3be9, "794284dc8937577607907c850d2b4737a72287b978d2d0c825871c94235825793579f65a1d71dbb87264832e075696012e6094722a32650e4895c6629eb4c5a0ddfdc826cf2ee3fbaa44861f19f2afa6b1de920e1e59be6b57ad725d9d50dce4a0e808cedb9b9f81b58800d477feaaacdf2385a3a77a1921a9e7394c755b1a23b179dc09c2868904c157447784ce9da0b813f285e1d54ab2218c3366143f425bfc4e5e33207d20d8e5d7fd92d2f4d7193247a9c79b"}, 0xc8, 0x4000000}], 0x2, 0x4840) r2 = socket(0x22, 0x2, 0x2) getpeername$inet(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000001840)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000f25d250ab198a9455ab16c59f5638d03c760bddb6f595577a5e54e709f7d45c651396018aedd5980aba7620934dbdd199c3e21399f5898edfb2dc09c86ab31266efad6e0eadd461cd9a31a33fc94ea8936c40199de5ba1356fc95581be3682d4280247c493dc"], 0x48) [ 691.481001][ T27] audit: type=1804 audit(1584762724.499:1302): pid=20646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/76/file0/file0" dev="loop0" ino=241 res=1 03:52:04 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000003c0)=0x8000000000000003, 0x4) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r3, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x40, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='h\x00\x00@', @ANYRES16=r6, @ANYBLOB="05010000000000000000010000000000000007410000004c0018000007d075647000"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00faffbd7000fbdbdf2501000000000000000b000000000c001473797a3000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000) r7 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000010000108ffff20000000000000000000", @ANYRES32=r8, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) 03:52:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0xfffffffffffffbff, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0xfffffffffffffffd}, {&(0x7f00000001c0)="aaf5bc8b31496947fb49e8222c5ca75f54bb13b5d718030bad1d060cb326eb5d2c1969c19ff5eda29315e0891f869c0301928c5703b2ada4f99d7976282e755ab3e0282c4eecd868cdfc7c4cc6fea508178750a197e208cb5e882f07c82c80e53c2dcc384fe274", 0x0, 0x6}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 691.799355][ T27] audit: type=1800 audit(1584762724.699:1303): pid=20657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16781 res=0 03:52:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:05 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0984124, &(0x7f0000000040)) [ 692.042143][ T27] audit: type=1804 audit(1584762724.729:1304): pid=20657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/11/file0/file0" dev="sda1" ino=16781 res=1 [ 692.136698][T20675] FAULT_INJECTION: forcing a failure. [ 692.136698][T20675] name failslab, interval 1, probability 0, space 0, times 0 [ 692.282663][T20679] FAT-fs (loop3): bogus number of reserved sectors [ 692.322453][T20675] CPU: 0 PID: 20675 Comm: syz-executor.2 Not tainted 5.6.0-rc6-syzkaller #0 [ 692.331172][T20675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.341234][T20675] Call Trace: [ 692.344541][T20675] dump_stack+0x188/0x20d [ 692.348893][T20675] should_fail.cold+0x5/0xa [ 692.353419][T20675] ? fault_create_debugfs_attr+0x140/0x140 [ 692.359251][T20675] should_failslab+0x5/0xf [ 692.363674][T20675] __kmalloc+0x2d9/0x7a0 [ 692.367928][T20675] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 692.373303][T20675] ? d_absolute_path+0x10c/0x160 [ 692.378257][T20675] ? __d_path+0x140/0x140 [ 692.382613][T20675] tomoyo_encode2.part.0+0xec/0x3b0 [ 692.387831][T20675] tomoyo_encode+0x28/0x50 [ 692.392257][T20675] tomoyo_realpath_from_path+0x184/0x620 [ 692.392840][T20679] FAT-fs (loop3): Can't find a valid FAT filesystem [ 692.397907][T20675] tomoyo_path_number_perm+0x1c2/0x4d0 [ 692.397922][T20675] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 692.397942][T20675] ? tomoyo_execute_permission+0x470/0x470 [ 692.398012][T20675] ? selinux_file_mprotect+0x610/0x610 [ 692.426855][T20675] ? __fget_files+0x329/0x4f0 [ 692.431555][T20675] ? ksys_dup3+0x3c0/0x3c0 [ 692.435988][T20675] ? vfs_write+0x15b/0x5c0 [ 692.440423][T20675] security_file_ioctl+0x6c/0xb0 [ 692.445376][T20675] ksys_ioctl+0x50/0x180 [ 692.447358][ T27] audit: type=1800 audit(1584762725.419:1305): pid=20678 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16787 res=0 [ 692.449628][T20675] __x64_sys_ioctl+0x6f/0xb0 [ 692.449644][T20675] ? lockdep_hardirqs_on+0x417/0x5d0 [ 692.449661][T20675] do_syscall_64+0xf6/0x7d0 [ 692.449683][T20675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.493307][T20675] RIP: 0033:0x45c849 [ 692.497203][T20675] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.516949][T20675] RSP: 002b:00007f20567a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.525378][T20675] RAX: ffffffffffffffda RBX: 00007f20567a86d4 RCX: 000000000045c849 [ 692.533354][T20675] RDX: 0000000020000040 RSI: 00000000c0984124 RDI: 0000000000000003 [ 692.541428][T20675] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 692.549401][T20675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 692.557375][T20675] R13: 0000000000000203 R14: 00000000004c4253 R15: 0000000000000002 03:52:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x82) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x614080, 0x2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0xe, 0x6, 0x201}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x44) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 692.673654][ T27] audit: type=1800 audit(1584762725.699:1306): pid=20682 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16793 res=0 [ 692.832902][ T27] audit: type=1804 audit(1584762725.739:1307): pid=20682 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/12/file0/file0" dev="sda1" ino=16793 res=1 [ 692.882364][T20675] ERROR: Out of memory at tomoyo_realpath_from_path. [ 692.929479][T20646] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:06 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc0984124, &(0x7f0000000040)) [ 693.051771][ T27] audit: type=1804 audit(1584762725.879:1308): pid=20674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/147/file0/file0" dev="sda1" ino=16787 res=1 03:52:06 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x6) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 693.152370][T20674] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:52:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) set_tid_address(&(0x7f0000000140)) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000240)={0x4, 0x4, {0x51, 0x4, 0x1, {0x2, 0x1f}, {0x1000, 0x7}, @period={0x5a, 0x2e29, 0x3, 0x8001, 0x3ff, {0x0, 0x0, 0x120, 0x404}, 0x4, &(0x7f0000000040)=[0x72b9, 0x7fff, 0x0, 0x1f]}}, {0x53, 0x1f, 0x101, {0xbb, 0x7ff}, {0x1, 0x8}, @const={0x3, {0x8001, 0x1f8, 0x1, 0xf}}}}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r5, r4, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0xfff, 0xa, 0x4, 0x20, 0xffff9102, {0x77359400}, {0x5, 0x0, 0x9, 0x52, 0x81, 0x4, "750d61b0"}, 0x401, 0x2, @fd=r7, 0x6, 0x0, r5}) sendfile(r3, r4, 0x0, 0x7fffffa7) 03:52:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:06 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2, &(0x7f0000000040)) 03:52:07 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x10, &(0x7f0000000040)) 03:52:07 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2272, &(0x7f0000000040)) 03:52:07 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4112, &(0x7f0000000040)) 03:52:07 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4122, &(0x7f0000000040)) [ 694.474228][T20712] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:07 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4140, &(0x7f0000000040)) 03:52:07 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 694.692850][T20729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:52:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:08 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4141, &(0x7f0000000040)) 03:52:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x10) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 695.093449][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 695.093462][ T27] audit: type=1800 audit(1584762728.349:1316): pid=20773 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16780 res=0 03:52:08 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4142, &(0x7f0000000040)) [ 695.148967][ T27] audit: type=1804 audit(1584762728.379:1317): pid=20773 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/78/file0/file0" dev="sda1" ino=16780 res=1 [ 695.559541][ T27] audit: type=1800 audit(1584762728.699:1318): pid=20786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=245 res=0 [ 695.656021][ T27] audit: type=1804 audit(1584762728.709:1319): pid=20786 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/15/file0/file0" dev="loop3" ino=245 res=1 [ 695.707210][ T27] audit: type=1800 audit(1584762728.709:1320): pid=20782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=246 res=0 03:52:09 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4143, &(0x7f0000000040)) [ 695.785214][T20773] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 695.822500][ T27] audit: type=1804 audit(1584762728.929:1321): pid=20782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/149/file0/file0" dev="loop5" ino=246 res=1 03:52:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:09 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) [ 695.992273][T20782] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:52:09 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000), 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r6, &(0x7f0000000300)=0x100000002, 0x402, 0x9) r7 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 696.324970][ T27] audit: type=1800 audit(1584762729.579:1322): pid=20817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=247 res=0 03:52:09 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4147, &(0x7f0000000040)) [ 696.349025][ T27] audit: type=1804 audit(1584762729.579:1323): pid=20817 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/79/file0/file0" dev="loop0" ino=247 res=1 03:52:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x208200) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={0x32, 0x6, 0x0, {0x4, 0x1, 0x9, 0x0, '\\vboxnet1'}}, 0x32) r4 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000129bd7000ffdbdf25060000000800040000000000080004000300000006000b000100000008000c0002000000080002000300000008000700ac1e010106000b001f00000008000800ac1414bb"], 0x3}, 0x1, 0x0, 0x0, 0x801}, 0x40800) sendmsg$NLBL_MGMT_C_REMOVE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000427bd7000fddbdf000000000014000600ff80000000000000000000000000008108000800ac1e000100000008000800ffffffff"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4010) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r5, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 696.560266][ T27] audit: type=1800 audit(1584762729.809:1324): pid=20826 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=248 res=0 03:52:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4148, &(0x7f0000000040)) [ 696.715199][ T27] audit: type=1804 audit(1584762729.809:1325): pid=20826 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/16/file0/file0" dev="loop3" ino=248 res=1 [ 696.789776][T20817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:10 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = socket(0x22, 0x2, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000340)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER_CANCEL(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r5, 0x400, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000880}, 0x48050) getpeername$inet(r3, 0x0, 0x0) recvfrom$x25(r3, &(0x7f0000000240)=""/96, 0x60, 0x1, &(0x7f00000000c0)={0x9, @remote={[], 0x3}}, 0x12) r6 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r7, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r8 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESDEC=r2]], @ANYRES32=r9, @ANYBLOB="012001000000000008001c00ef000000"], 0x3}}, 0x0) 03:52:10 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000240)={0x7, 0x7, 0x4, 0x20000, 0x7fffffff, {0x77359400}, {0x3, 0x8, 0x80, 0x6, 0xc0, 0x6, "8f9bd253"}, 0x4, 0x2, @fd=r6, 0x3f, 0x0, 0xffffffffffffffff}) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000400)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(r7, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x90, r8, 0xa15, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2c}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:mount_exec_t:s0\x00'}]}, 0x90}, 0x1, 0x0, 0x0, 0x24004000}, 0x40) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r9, @ANYBLOB="0120ecff0000000008001c00ef00000046ce9ccd1a108b81340999c1532fb0cde1bd83848450aae49a5beb3a26699c91f2eb969113cbc62dd583050e6fe01937a0d8f244287ea8b1b3fa7cd4a8a4acf43a251bb6041ea2d61e886abc47a03ccef34b2c78759a4cf181fb7bed973bb2e44d40261f2d45772e9af0"], 0x28}}, 0x0) 03:52:10 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) 03:52:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4161, &(0x7f0000000040)) 03:52:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x0, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4b47, &(0x7f0000000040)) 03:52:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:10 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) 03:52:10 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4b49, &(0x7f0000000040)) 03:52:10 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) [ 697.695042][T20874] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e6661740002040100cff6d59ffff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) fchdir(r0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r5, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) open(&(0x7f0000000140)='./file0\x00', 0x200000, 0x40) 03:52:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000000c0)={r8}, 0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r8, 0x400}, &(0x7f0000000240)=0x8) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r9, @ANYBLOB="5c397ffa0a70f327ce998501200100cd503fc5ca8921ae00d3b866e57943d452ff660f37c1cc13d690f740c84f5ad8bdcf51d9ec265e00d79464116777f824f45892865e457c020983a28c4331e258a6e75f62330f9739fdab775a2a6ec10000318d50c7ee770edccbb05c330584"], 0x28}}, 0x0) 03:52:11 executing program 5: ioctl(0xffffffffffffffff, 0x4144, &(0x7f0000000040)) 03:52:11 executing program 5: ioctl(0xffffffffffffffff, 0x4144, &(0x7f0000000040)) 03:52:11 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4c01, &(0x7f0000000040)) 03:52:11 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) [ 698.111912][T20894] FAT-fs (loop3): bogus number of directory entries (54774) [ 698.132462][T20894] FAT-fs (loop3): Can't find a valid FAT filesystem [ 698.194475][T20890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 698.299034][T20894] FAT-fs (loop3): bogus number of directory entries (54774) [ 698.307872][T20894] FAT-fs (loop3): Can't find a valid FAT filesystem 03:52:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x0, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:11 executing program 5: ioctl(0xffffffffffffffff, 0x4144, &(0x7f0000000040)) 03:52:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x5421, &(0x7f0000000040)) 03:52:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r2, r1, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) sendfile(r4, r1, 0x0, 0x805fffffa7) 03:52:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:12 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) 03:52:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x5450, &(0x7f0000000040)) 03:52:12 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) [ 699.090723][T20917] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x5451, &(0x7f0000000040)) 03:52:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080000000000", @ANYRES32=r6, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) 03:52:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001800)={0x0, 0x0}, &(0x7f0000001840)=0xc) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0xa, &(0x7f0000001700)=[{&(0x7f00000001c0)="f21b8950a5ef", 0x6, 0x2}, {&(0x7f0000000200)="342cff5e911a8e6f5ad66aa9257836b0f96bd72886f131c7bf6db32b6509910fc2becfa8770fed1e213d", 0x2a, 0x5}, {&(0x7f0000000240)="024ad8db2ddbab", 0x7, 0xff}, {&(0x7f0000000580)="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", 0x1000, 0x6}, {&(0x7f0000000280)="ed33e1a9516c521e7d8aecb5b4c61d3cc111168560f8bac6f2af46607f2152cd45ac2eec038db8a043c9867b90b672efef858e839ae9727024e036d26e0b779d233d5b2c6fbf3140bd07e57b4c0cd1e4a4f89776594cb68c87e5e7c555be72246219433707e822dee3a8687fa87007ff360c08c55ce607aa4560bc5924609150cef99c3b5224f4a0a9b0633104b5c4a648e389ee13de6c4711e62c62d31c9db1770536c22127dd6adc61dcbcfbdb4f93c95be88fc3edcf596a7190dda044890236c30a145410e347614c3b3e91c9c0735e12c620674484e0934e63a1704af327866395e43de85f24d1750f80", 0xec, 0x4}, {&(0x7f00000003c0)="380fce8288d5299cef30e132277fbcb0733fd4e127deab840bf7a86fbc6fdf1680b332a584678837492c40faa5f97af97e4a7c96d4926642ec222324c4064f832af1d78ced2605fa18df8f7381d906c13892c8e97321f01b46c812a42f81548d4dc11501c4e0366803242e81a1aaf1f72593a90b586c7b1b19f6d7b58fe84a74b91ea2a3b25c14a11751c268aefe982de041bd996f75c6c2ca451f3bed1e4967a0f9a77580105f90a589967f36f71ae5aa80f88cc81bb8f7f4e3d6018de50c", 0xbf, 0x200}, {&(0x7f0000000480)="57c941026025473989e96c6e30195bad80057dc02d2fb958b0c1f02ed1beef056c1168", 0x23, 0x7fff}, {&(0x7f00000004c0)="a42c1def228f2f30d3eb388aff0d204603d9f6d73adefe01e5709a1381aa28882aad1fe988b92e54b060f8f6bc9294256c0967c8ebe7881365b5624a584848bd328f7112c9c01233003db7ded220da09538894eaae533f4a8e57789bacab12e83bbd30300afa1c", 0x67, 0x2}, {&(0x7f0000001580)="b5907368f1e6ac9d2aff916262fddeba14337e4fcceb1cca426b42b3c076571e4e6ffe08b3dc9a3b49a5fb3b17377747d743e77ce39032cec3b158338c1bc7c9b42ebd4fac9831d6bcbc5e2a7a75d65f2ae73287f5dbddb15a7b242f8f913ef7378414ad027e4db356fa63a628431f48fdec9db4e313cbc8d041396d2d0c9670f016b390d5b5d2e197ce8f26cbf4abd5b591d78122210921d60e3e2fa9edcd3fdaba788b587fc33f2de0a8d922faac27ea8b2264b6b2d3162e92cb415829d76e7a81f29b3dfc8acd42308b736b0d4bcd75dc87b945a659b4a8fb72777c83b29dcd295081f2138314b33aba64d39c1cba80feda", 0xf3, 0x6}, {&(0x7f0000001680)="906616b0ab7a2d9bbe655a1f60eb2d4438b43d1e9be2d5dc6f1eedfddd540ce76e7079e3b11060999b078616175cc4e764bdad3ec1d4b52301644b9ffebe5f0dab4abf41", 0x44, 0x7}], 0x1040c20, &(0x7f0000001880)={[{@uid={'uid', 0x3d, r6}}, {@session={'session', 0x3d, 0x7}}, {@dir_umask={'dir_umask', 0x3d, 0x3ff}}], [{@dont_measure='dont_measure'}, {@fowner_gt={'fowner>', r7}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_role={'obj_role', 0x3d, '-uservmnet0'}}, {@dont_hash='dont_hash'}]}) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x0, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:12 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x4144, &(0x7f0000000040)) 03:52:12 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x5452, &(0x7f0000000040)) 03:52:12 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x4144, &(0x7f0000000040)) [ 699.793149][T20959] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:13 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x4144, &(0x7f0000000040)) [ 699.877068][T20959] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100), 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) bind$xdp(0xffffffffffffffff, &(0x7f0000000340)={0x2c, 0xa, 0x0, 0x3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$selinux_create(r7, &(0x7f0000000240)=@access={'system_u:object_r:modem_device_t:s0', 0x20, '/usr/sbin/cups-browsed'}, 0x50) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 699.943932][T20969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:13 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x5460, &(0x7f0000000040)) 03:52:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r6) keyctl$read(0xb, r6, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r6, 0x0, &(0x7f00000000c0)='wlan1nodev[\x00') pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x522, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0xfffffff800000000}], 0x40c00, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x4001, 0xde) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:13 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x4144, &(0x7f0000000040)) 03:52:13 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x6364, &(0x7f0000000040)) [ 700.769293][ T166] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 700.789186][ T166] batman_adv: batadv0: Removing interface: batadv_slave_0 03:52:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:14 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8905, &(0x7f0000000040)) 03:52:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0xfffffc, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x804000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f00000001c0)={0x200, 0x8, 0xffffff80}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r5, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:14 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0x1d, 0x0, 0x1, 0x0, 0x0, 0x2405c895}, 0x400c884) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0500000000000000000001000000040004000500050009000000050006000000000008000300970d00007d695d6c8712fd67745ecbaa20c64389f85d0d9cd5c97633075de0ce069b8d06d323b70527f6"], 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x604010c0}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="34eeff00", @ANYRES16=r5, @ANYBLOB="000827dbe8981254fa640737fc5dbd7000fcdbdf250400000008000200010001000800040000003d0eebc214ac1ebbfc22ba24305220395de176ae42dc13bac8f684949182c3e59039e505c2b52aa63ad95ef19516034b2b951f384cc23bec6f871cb081902fef5cb797f639ec5febb4087fdd1ef0d6801b"], 0x34}, 0x1, 0x0, 0x0, 0x44011}, 0x4c004) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r6, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r7 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20000005}, 0x10) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@ipv4_newroute={0x34, 0x18, 0x20, 0x70bd29, 0x25dfdbfc, {0x2, 0x80, 0x14, 0x80, 0x0, 0x1, 0xfe, 0x2, 0x1300}, [@RTA_GATEWAY={0x8, 0x5, @empty}, @RTA_PREFSRC={0x8, 0x7, @remote}, @RTA_PREFSRC={0x8, 0x7, @remote}]}, 0x34}}, 0x0) [ 700.852010][ T166] device bridge_slave_0 left promiscuous mode [ 700.932374][ T166] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.075727][ T166] device veth1_macvtap left promiscuous mode [ 701.257875][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 701.257889][ T27] audit: type=1800 audit(1584762734.509:1338): pid=21033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=253 res=0 03:52:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100), 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:14 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)) [ 701.288052][ T27] audit: type=1804 audit(1584762734.519:1339): pid=21033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/83/file0/file0" dev="loop0" ino=253 res=1 03:52:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8933, &(0x7f0000000040)) 03:52:14 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8953, &(0x7f0000000040)) 03:52:14 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4144, 0x0) [ 707.652391][ T166] device hsr_slave_1 left promiscuous mode [ 708.596971][ T166] team0 (unregistering): Port device team_slave_1 removed [ 709.250725][ T166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 709.762330][ T166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 711.051662][ T166] bond0 (unregistering): Released all slaves [ 711.923655][T21033] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x0, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:26 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8955, &(0x7f0000000040)) 03:52:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000140)=0x6, 0x4) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100), 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:26 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000540)=@assoc_value={0x0}, &(0x7f0000000040)=0x4d) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r7}, 0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000340)={r7, 0x64d, 0x7, 0x1000, 0x3, 0xffff, 0x3f, 0x4, {0x0, @in6={{0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x5}, 0x4}}, 0x40, 0x8, 0x7, 0x4}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000400)={r8, @in={{0x2, 0x4e24, @rand_addr=0x4452c6de}}, 0x0, 0x5, 0x10001, 0x4b8964f1, 0x6}, &(0x7f0000000280)=0x98) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2800001010000108000000000000000000000000ed06b75cd85f65e7ccd110778e726b0f36a17f6425eead4908b36ff53a4c5c6ace857ccd030a71709781d05e4bf96b104f0e8c6292cb169e58ef1da0243c92197db02d33bb0d3b718e23fde519ab687f9d3da18e8ce85c76f2b3e0a6316150ba996bc05680b30a8d738afb3c4f6674da2fd3e497f1ea9f", @ANYRES32=r6, @ANYBLOB="01200100000000d01233464e741dafeae300080035ab5bccf0acf3dbec36bf4c8ec5686af13e9305d0d67c9baef3a2afcec07d3b61a0f47a85c89dfe8895dd5c78cf7c38dd3b028ce3fd13e3eb1cb34bf4d20a7704a75e"], 0x28}}, 0x0) [ 713.120796][ T27] audit: type=1804 audit(1584762746.369:1340): pid=21202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/166/file0" dev="sda1" ino=16626 res=1 03:52:26 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x89e0, &(0x7f0000000040)) [ 713.388986][T21198] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 713.471570][ T27] audit: type=1804 audit(1584762746.419:1341): pid=21198 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/166/file0" dev="sda1" ino=16626 res=1 03:52:27 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0xe) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FBIO_WAITFORVSYNC(r8, 0x40044620, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r6, @ANYBLOB="0100fa63da53b5ae4ecfb11c355ec18d588fc1443025db3a4b4faa3c09c09975303390c4b833cfdfe383d4f4a4e8835a09cc02337c108b575abede0dc68e9e05abe44447335ae1fc8d7df3fde3120675ac10a3d522554e6e8db0071188f30b1036b85eb05376a25143bed21bc2542e0be4c3de3c7212a4318cb2073bdb0bf061c5397f5a38b8316809a1a90bd1e17de4f467823464fa76fc3fcd76fd0541afad917188c4207b9275e69dffb54a1a84c33a366040fb20b436a21a1b79bb10b6c27d320797898102912b32f73d7b1828"], 0x28}}, 0x0) 03:52:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x18) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) getpeername$inet(r4, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 714.054437][ T27] audit: type=1800 audit(1584762747.239:1342): pid=21220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16521 res=0 03:52:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x89e2, &(0x7f0000000040)) [ 714.276715][T21220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 714.517119][ T27] audit: type=1804 audit(1584762747.299:1343): pid=21220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/84/file0" dev="sda1" ino=16521 res=1 [ 714.881055][T21236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xae01, &(0x7f0000000040)) [ 715.072430][ T27] audit: type=1804 audit(1584762747.969:1344): pid=21241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/23/file0" dev="sda1" ino=16785 res=1 [ 715.149996][T21229] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 715.338650][ T27] audit: type=1800 audit(1584762747.969:1345): pid=21238 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16785 res=0 03:52:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="eb3c906d6b667300002cbc9f8094b3e4d959857f58600c80df64cfd49e00f17000f8947f87026814c91e25a5e3ef241018074eaf6a9aa337686f649b649ec8cad679c071811359607b3b9274e371deba6e49aaa9d13bfe593b3dbdfc17471a792d6ecb75ff60100000000000000000", 0x6f, 0x10000}], 0x2000000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x101000, 0x0) socket$phonet(0x23, 0x2, 0x1) dup3(r0, r3, 0x80000) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000240)=0x10) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000280)={@loopback}, &(0x7f0000000340)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r5, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket(0x22, 0x2, 0x2) getpeername$inet(r7, 0x0, 0x0) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f00000003c0)=@req={0x7, 0x2, 0x8001, 0x10000}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12001, 0x10016}, [@IFLA_PROTO_DOWN={0x5, 0x1c, 0xffffffef}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x81}]}, 0x30}}, 0x4800) 03:52:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x0, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:29 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xae41, &(0x7f0000000040)) [ 716.028303][ T27] audit: type=1800 audit(1584762749.279:1346): pid=21261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16517 res=0 [ 716.142774][T21257] FAT-fs (loop3): bogus number of reserved sectors [ 716.213441][T21263] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 716.222712][T21257] FAT-fs (loop3): Can't find a valid FAT filesystem 03:52:29 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044102, &(0x7f0000000040)) [ 716.412318][ T27] audit: type=1804 audit(1584762749.279:1347): pid=21261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/24/file0" dev="sda1" ino=16517 res=1 03:52:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x2, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(r5, 0x401870cc, &(0x7f0000000240)={0x9, 0x401, 0x9f93, 0xfffffffc}) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r6, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r7 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x7fffffff, 0x5, 0x3, 0x6}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 716.709374][T21284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 716.756916][T21257] FAT-fs (loop3): bogus number of reserved sectors [ 716.802389][T21257] FAT-fs (loop3): Can't find a valid FAT filesystem [ 716.899387][ T27] audit: type=1804 audit(1584762749.569:1348): pid=21275 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/167/file0/file0" dev="sda1" ino=16867 res=1 03:52:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 717.047849][T21262] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:52:30 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044103, &(0x7f0000000040)) 03:52:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0xff}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 717.248724][ T27] audit: type=1804 audit(1584762749.729:1349): pid=21273 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/167/file0/file0" dev="sda1" ino=16867 res=1 03:52:30 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r7}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x6}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:30 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044104, &(0x7f0000000040)) [ 717.620355][T21309] FAT-fs (loop3): bogus number of reserved sectors [ 717.648151][T21309] FAT-fs (loop3): Can't find a valid FAT filesystem 03:52:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 717.832506][T21309] FAT-fs (loop3): bogus number of reserved sectors 03:52:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044145, &(0x7f0000000040)) 03:52:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x0, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 717.982453][T21309] FAT-fs (loop3): Can't find a valid FAT filesystem 03:52:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 718.128804][ T27] kauditd_printk_skb: 5 callbacks suppressed [ 718.128819][ T27] audit: type=1804 audit(1584762751.379:1355): pid=21330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/86/file0/file0" dev="sda1" ino=16863 res=1 [ 718.218897][T21330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:31 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000380)={0x7, 0x7, 0x3f, 0x0, 0x8}) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r5, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40044) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x5, 0x1c, 0xffffffef}]}, 0x28}}, 0x800) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) socket$inet6_mptcp(0xa, 0x1, 0x106) 03:52:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x80) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000a80)=ANY=[@ANYBLOB="3c10edf7764fee8681d5a89d8f5f3500000000005d3562208f2c7d0118492a2db1b0a45cbf199872cc3a7749481ef7d7ccd3ecabed7439dbc15b769e3a23705f9a19220a6ef6dcfc776b7176a2d28cdcb15ae633c2e989a7cd88e4626cdfb8f7957bf8f884ddc2054fff1c61e01cdab091ac472ca9193d007da6a4cda07f1db88cb0151c3b5271e23fe9f13d82edfdaa1f57ea9e2b38e8f89e542f5ec38201cee2c187e95f9b8f366557174d8a827f85bdc0ee1101e35acc4de5958d9d62ed0d2177bb414f9e50f5f3bb27b14461392deb5012238a0f2b4e5fe962a348fc9350d64e486e", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800900010076657468000000000400028008000a00", @ANYRES32=r6, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=@delqdisc={0x4f8, 0x25, 0x20, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0xe, 0xc}, {0xe, 0xfff0}, {0xffe0}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x7fff}, @TCA_STAB={0x108, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x28, 0x4, 0x68f, 0x2, 0x80000000, 0x0, 0x3}}, {0xa, 0x2, [0xa1b7, 0x19, 0x0]}}, {{0x1c, 0x1, {0x3f, 0x1, 0x2, 0x8, 0x1, 0x81, 0x7, 0x5}}, {0xe, 0x2, [0x8, 0x0, 0x3, 0x401, 0x24f]}}, {{0x1c, 0x1, {0x40, 0x20, 0x200, 0x3, 0x3, 0xef29, 0x2, 0x2}}, {0x8, 0x2, [0x4, 0x3]}}, {{0x1c, 0x1, {0x81, 0x5, 0x4, 0x4, 0x0, 0x8, 0x9}}, {0x4}}, {{0x1c, 0x1, {0x4, 0x9, 0x6, 0x80000001, 0x1, 0x7, 0x20, 0x2}}, {0x8, 0x2, [0x100, 0x1]}}, {{0x1c, 0x1, {0x7, 0x3, 0x8000, 0x28, 0x0, 0x59c, 0x4, 0x2}}, {0x8, 0x2, [0x5, 0xfffb]}}, {{0x1c, 0x1, {0x3, 0x84, 0x7f, 0x1000, 0x0, 0x7, 0x9, 0x1}}, {0x6, 0x2, [0x3f]}}]}, @TCA_STAB={0x130, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xa9, 0x3, 0x1, 0x3, 0x2, 0xffffffff, 0x67fd, 0xa}}, {0x18, 0x2, [0x4, 0x2, 0x7ff, 0x0, 0x6, 0x800, 0x6b, 0x80a9, 0x8, 0x4]}}, {{0x1c, 0x1, {0xd6, 0x7b, 0x26d, 0x3d, 0x1, 0x93, 0x3, 0x5}}, {0xe, 0x2, [0x2, 0xf801, 0x2, 0x6, 0x5]}}, {{0x1c, 0x1, {0x9, 0x4, 0x5, 0x6, 0x2, 0x3, 0x2, 0x1}}, {0x6, 0x2, [0x6]}}, {{0x1c, 0x1, {0xb, 0x3a, 0x1, 0xffffffff, 0x2, 0x1, 0x4000, 0x1}}, {0x6, 0x2, [0x9]}}, {{0x1c, 0x1, {0x1, 0x8, 0xfff9, 0x4, 0x1, 0xfffffffb, 0x3, 0x5}}, {0xe, 0x2, [0x9, 0xa7, 0x7f, 0x3, 0x2]}}, {{0x1c, 0x1, {0x3, 0x3, 0x269d, 0x8, 0x0, 0x3f, 0x3, 0x9}}, {0x16, 0x2, [0xd4, 0x6, 0xe9, 0x5, 0x3, 0x859, 0x7, 0x7, 0x800]}}, {{0x1c, 0x1, {0x7f, 0x81, 0x6e54, 0xb44, 0x2, 0x401, 0x7f, 0x1}}, {0x6, 0x2, [0x3ff]}}]}, @TCA_STAB={0x108, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0xd1, 0x7, 0x9, 0x0, 0x3, 0x63c, 0x1}}, {0x6, 0x2, [0x40]}}, {{0x1c, 0x1, {0x80, 0x47, 0x54, 0x7, 0x0, 0x9, 0x200, 0x7}}, {0x12, 0x2, [0x400, 0x0, 0xd69d, 0x8, 0x6, 0xc96b, 0x5]}}, {{0x1c, 0x1, {0x3, 0x3c, 0xfff4, 0x5, 0x1, 0x6d046fde, 0x8, 0x3}}, {0xa, 0x2, [0x3, 0x3, 0x1ff]}}, {{0x1c, 0x1, {0x80, 0x5, 0x4, 0x5, 0x1, 0x8, 0x200, 0x6}}, {0x10, 0x2, [0x9, 0x101, 0x8001, 0x5b, 0x9, 0x8]}}, {{0x1c, 0x1, {0x5, 0x6, 0x1ff, 0x8, 0x1, 0x3a2, 0x3f, 0x7}}, {0x12, 0x2, [0x2cf, 0x58, 0x7, 0x2, 0x40, 0x200, 0xacd]}}, {{0x1c, 0x1, {0x0, 0x46, 0x0, 0x0, 0x2, 0x7ff, 0x1ff, 0x5}}, {0xe, 0x2, [0x8, 0x1ff, 0x3b, 0x3ff, 0xd18]}}]}, @TCA_STAB={0x84, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0xcb, 0x2, 0x3ff, 0x1, 0x8, 0x10001, 0x3}}, {0xa, 0x2, [0x268, 0xfb, 0x81]}}, {{0x1c, 0x1, {0x9, 0xfa, 0x800, 0xffff, 0x0, 0x0, 0x1, 0x4}}, {0xc, 0x2, [0x9, 0x2b, 0x3, 0x5]}}, {{0x1c, 0x1, {0x13, 0xff, 0x1, 0xff, 0x1, 0x7, 0x2, 0x7}}, {0x12, 0x2, [0x0, 0x9, 0x81, 0x5, 0x1, 0x800, 0x1]}}]}, @TCA_RATE={0x6, 0x5, {0x5, 0xe8}}, @TCA_STAB={0x8c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xf8, 0x3f, 0xfff, 0x24000000, 0x0, 0x9, 0x401, 0x8}}, {0x14, 0x2, [0xfff, 0x5c83, 0x424, 0x236, 0x8, 0x6, 0x6, 0x6]}}, {{0x1c, 0x1, {0x7, 0x6e, 0x6000, 0x40000000, 0x2, 0x200, 0x4, 0x6}}, {0x10, 0x2, [0x11d, 0x8, 0x9, 0x77ac, 0x5, 0x40]}}, {{0x1c, 0x1, {0x80, 0x81, 0x3, 0xbb95, 0x0, 0x7, 0x8, 0x5}}, {0xe, 0x2, [0x9, 0x9, 0xffff, 0xffff, 0x80]}}]}, @qdisc_kind_options=@q_mqprio={{0xb, 0x1, 'mqprio\x00'}, {0x60, 0x2, {{0x6, [0x0, 0x5, 0xa, 0xe, 0x9, 0x4, 0x8, 0x7, 0x6, 0xf, 0xa, 0xa, 0x6, 0xf, 0x8], 0x1, [0x8b9, 0x8, 0x27f, 0xd4d9, 0x7f, 0x8001, 0x8, 0x4a, 0x4000, 0x4, 0xfffc, 0x0, 0x9, 0x3ff, 0x80], [0x5, 0x9, 0x8, 0x4, 0x5, 0x0, 0x400, 0x7, 0x3, 0xa1, 0x3f, 0xfff, 0x401, 0x40, 0x2, 0x8]}, [@TCA_MQPRIO_MODE={0x6}]}}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x4}]}, 0x4f8}, 0x1, 0x0, 0x0, 0x20000044}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000040)) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40044160, &(0x7f0000000040)) [ 718.360256][T21338] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 718.422791][T21338] netlink: 'syz-executor.1': attribute type 28 has an invalid length. 03:52:31 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r5, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = dup2(r4, 0xffffffffffffffff) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f00000000c0)={0x1, 0x9, 0xdf, 0x0, 0x1, 0x2, 0x6, 0x2, 0x6, 0x0, 0x0, 0x10, 0x0, 0x200, 0x2, 0x5, 0x1, 0x5, 0x5, [], 0x4, 0x200}) r7 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:31 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0800000010000108000300000000000000000000f2b7b04399292d25b39b515e74f005ff", @ANYRES32=r6, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) [ 718.583676][ T27] audit: type=1800 audit(1584762751.839:1356): pid=21340 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=254 res=0 03:52:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:31 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x400443c8, &(0x7f0000000040)) [ 718.665884][T21340] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 718.739407][ T27] audit: type=1804 audit(1584762751.879:1357): pid=21340 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir974425888/syzkaller.79sxVL/168/file0/file0" dev="loop5" ino=254 res=1 [ 718.850196][ T27] audit: type=1800 audit(1584762751.939:1358): pid=21357 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=255 res=0 [ 718.947658][ T27] audit: type=1804 audit(1584762751.949:1359): pid=21357 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/26/file0/file0" dev="loop3" ino=255 res=1 03:52:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000001780)=0x2, &(0x7f00000017c0)=0x2) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40045436, &(0x7f0000000040)) 03:52:32 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r8 = socket$rds(0x15, 0x5, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYPTR64, @ANYRES32, @ANYRES16, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32], @ANYPTR64, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRESHEX=r7, @ANYPTR, @ANYRESHEX], @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES32, @ANYPTR, @ANYRESHEX=r0, @ANYPTR, @ANYRESOCT=0x0, @ANYRES16, @ANYRESDEC=r8]], @ANYBLOB="0120010000000000e989e870ef000000", @ANYBLOB="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"], 0x4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 719.055181][T21372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 719.080242][ T27] audit: type=1800 audit(1584762752.279:1360): pid=21372 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=256 res=0 [ 719.135100][ T27] audit: type=1804 audit(1584762752.289:1361): pid=21372 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/87/file0/file0" dev="loop0" ino=256 res=1 03:52:32 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) 03:52:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x400454ca, &(0x7f0000000040)) [ 719.404651][ T27] audit: type=1800 audit(1584762752.659:1362): pid=21395 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=257 res=0 [ 719.445318][ T27] audit: type=1804 audit(1584762752.689:1363): pid=21390 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/27/file0/file0" dev="loop3" ino=257 res=1 03:52:32 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800001a0000000000000000000000000000458564e7e582c9cd7f9647e8745a1ed02dfe2f0ad6b8fd8cfc1440ec4c7086bcf5f13c77f0ae3b2a4bbfc149040107fb1d16", @ANYRES32=r6, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) 03:52:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x440000, 0xbdbb9f508b7c752d) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_IOCTL(r5, &(0x7f0000000040)={0x20, 0x0, 0x1, {0x2, 0x0, 0x7, 0x4}}, 0x20) 03:52:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:32 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) 03:52:32 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x400454ce, &(0x7f0000000040)) [ 719.619293][T21409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21409 comm=syz-executor.1 [ 719.719312][T21411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21411 comm=syz-executor.1 03:52:33 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$midi(r2, &(0x7f0000000340)=""/133, 0x85) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp1\x00', 0x200400, 0x0) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) dup2(r5, r6) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r6, &(0x7f0000000300)=0x9, 0xaa1, 0x9) r7 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r8, @ANYBLOB="be997fb57716001efa00cd525288bf4d636adb59e3e261"], 0x28}}, 0x0) 03:52:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40049409, &(0x7f0000000040)) 03:52:33 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) 03:52:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) dup3(r3, r4, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 719.986222][T21429] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40084146, &(0x7f0000000040)) [ 720.023910][ T27] audit: type=1800 audit(1584762753.279:1364): pid=21424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=258 res=0 03:52:33 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r5, 0x0, 0x80, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000000c0)=0x78) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 720.135222][T21424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:33 executing program 5: ioctl(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 03:52:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) 03:52:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:33 executing program 5: ioctl(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 03:52:33 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40086602, &(0x7f0000000040)) 03:52:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:33 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) r7 = semget$private(0x0, 0x8, 0x0) semop(r7, &(0x7f0000000080)=[{0x0, 0x3f}, {}], 0x2) semop(r7, &(0x7f0000000040)=[{0x0, 0xffff}], 0x1) semctl$SETALL(r7, 0x0, 0x11, &(0x7f0000000000)=[0x2f68]) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f0000000340)=""/4096) 03:52:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000040)={0x1, 0x81}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/diskstats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r1, 0x80000) sendfile(r1, r2, 0x0, 0x7fffffa7) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000001c0), 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000500000007b0a00ff00000000a500000000000000"], &(0x7f0000000000)='GPL\x00', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='\x00', r6}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={r5, r6}) 03:52:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40087602, &(0x7f0000000040)) 03:52:34 executing program 5: ioctl(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 03:52:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4008ae89, &(0x7f0000000040)) 03:52:34 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) [ 721.080429][T21486] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:34 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) 03:52:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4008ae90, &(0x7f0000000040)) 03:52:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:34 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x541b, &(0x7f0000000040)) 03:52:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x38, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffe, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x2000a040) sendfile(r1, r2, 0x0, 0x7fffffa7) r7 = socket(0x22, 0x2, 0x2) getpeername$inet(r7, 0x0, 0x0) accept4$ax25(r7, &(0x7f00000001c0)={{0x3, @default}, [@rose, @rose, @rose, @netrom, @netrom, @default, @default, @netrom]}, &(0x7f0000000040)=0x48, 0x800) 03:52:34 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r7, 0x4) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r5, @ANYBLOB="0120010000000000081e1c00ef000000"], 0x28}}, 0x0) 03:52:34 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40184150, &(0x7f0000000040)) [ 721.788738][T21538] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:35 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 721.912411][T21534] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:35 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40184152, &(0x7f0000000040)) 03:52:35 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 03:52:35 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x458042, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000010000108000000000000000000bd239eacbe6fb39da3d52bc6d87e5eb8d70b9989e66495c36265aee5ab505f729b34bba5cd7a8d580545d02f3dcb09fcd8fd5a2fe77d256685e06d278011f47c6ed17f1845691df34a0000000000", @ANYRES32=r6, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) 03:52:35 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 03:52:35 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x401845c0, &(0x7f0000000040)) [ 722.405158][T21563] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:52:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) dup3(r3, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:35 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) [ 722.508114][T21571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28271 sclass=netlink_route_socket pid=21571 comm=syz-executor.3 [ 722.632949][T21574] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 722.939307][T21583] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:36 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:36 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40186366, &(0x7f0000000040)) 03:52:36 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x81) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000340)) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, &(0x7f0000000240)) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r5, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x90) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0xd0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getdents(0xffffffffffffffff, &(0x7f00000001c0)=""/223, 0xdf) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x2080, 0x8) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r5) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x9, 0x4, &(0x7f0000000680)=[{&(0x7f00000003c0)="6f72c72f83677676ba402f6d42e11120402db074054c161d148cae932fe9d277846bc6e891c034fc88a8315721341e99a4c836b0d206fa32883d4330ebc533d579a0f25be398b6fe18d9a83fb40d57243240959ab35cfc67fdc40f9c407e7a7637ea26a62261fbbcdc81f1359a94c7ed2f167b12ccb4bdd8034e0d0189935d5b8645", 0x82, 0x286}, {&(0x7f0000000580)="7fb5af7bf42cee9fadbd53220a96ab4dcb5e8dca961eecd3c8c650e3c1684e9d28440367ccf410feb5ee07fb01ad8e8974fe9a7753e81c5ce556705cc77ab2603e6dd141abca6ebf96a97162ed0fcd37398e1c1becd931d0c288c7cc9c3e136c5cf38f7788d30cf59c79846efb3237035eb6a18ec4d95fa3e4715d4d9a2805d784ffc665a601ef71e996157cbe0cc2acd2c2799df34a18b8d96b3af855ac3bdaa6e0e67ca530101aec7692a56bed98511c8cc33323245385d324d7dc835430624a73a5f3219197f235ee4ef77c8a2254", 0xd0, 0x401}, {&(0x7f0000000480)="c2c8938d0bb9d7c576cf2be58bcc28183c0eccbd9b43c684fe9e2612aae32cfcb5fd6a0534ba37a5ae106704c5250cf372fa88d317c55dbc663093aa323f1b8a5b2b7d153d066a26e23bb3d4b63275012e94ed9e9443901ef45470952cf8e2af0c5f4f9676e2e02dfe4d8314ef07df0e7e0e09a91820c271d436c5d0486a745b5929d872dcf1c75049d86836349ee324aaf86e2d72f271632ae714d8b19b164fdf", 0xa1, 0x6}, {&(0x7f0000000300)="7ef1c610956eb8506ddaf7b157f25e73625d7ace0bfe0288711bcc9ee7c5b06833a11567d00ec54864147ea14aeab401830ef955e99318ee0eeddb47b657da9f", 0x40, 0x3f}], 0x1001020, &(0x7f0000000700)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0x0, @ANYBLOB="2c63392c6174723d06e2a0382c6769643d", @ANYRESHEX=0x0, @ANYBLOB="2c73657373696f6e3ddfb5beb0c0b97ee7666666666666663165612c756d61736b3d30313737373737373737373737373737373737373737372c6769643d", @ANYRESHEX=r5, @ANYBLOB=',file_umask=00000000000000000000000,umask=00000000000000000000010,audit,\x00']) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:36 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4020940d, &(0x7f0000000040)) 03:52:36 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:36 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x5, 0x0) pipe(&(0x7f0000000140)) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r7}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000340)={{0x2a}, 'port0\x00', 0x5c, 0x20, 0x101, 0x3c, 0x0, 0xfff, 0x185e, 0x0, 0x7}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="00eb1700e62800"/20, @ANYRES32=r8, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) 03:52:36 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x541b, 0x0) [ 723.322370][ T27] kauditd_printk_skb: 13 callbacks suppressed [ 723.322384][ T27] audit: type=1800 audit(1584762756.569:1378): pid=21607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=262 res=0 03:52:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r4, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r3, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = socket$inet(0x2, 0x80001, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000000c0)={r6}, 0xc) r7 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3ff, 0xa90000) getsockname$l2tp(r7, &(0x7f00000001c0)={0x2, 0x0, @dev}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={r6, 0x7fffffff}, 0x8) 03:52:36 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4020ae76, &(0x7f0000000040)) [ 723.588452][ T27] audit: type=1804 audit(1584762756.609:1379): pid=21607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/32/file0/file0" dev="loop3" ino=262 res=1 03:52:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 723.639670][ T27] audit: type=1804 audit(1584762756.619:1380): pid=21607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/32/file0/file0" dev="loop3" ino=262 res=1 [ 723.691073][T21622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10470 sclass=netlink_route_socket pid=21622 comm=syz-executor.1 03:52:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4030582a, &(0x7f0000000040)) [ 723.966114][ T27] audit: type=1800 audit(1584762757.219:1381): pid=21633 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=263 res=0 [ 724.177158][ T27] audit: type=1804 audit(1584762757.259:1382): pid=21640 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/92/file0/file0" dev="loop0" ino=263 res=1 03:52:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40305839, &(0x7f0000000040)) 03:52:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x481002, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40bc5311, &(0x7f0000000040)) 03:52:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80044100, &(0x7f0000000040)) [ 724.640480][ T27] audit: type=1800 audit(1584762757.889:1383): pid=21660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=264 res=0 03:52:38 executing program 3: syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100, 0x8802) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000140)={0x800, 0x8}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r5, r4, 0x0) sendfile(r3, r4, 0x0, 0x7fffffa7) [ 724.919446][T21633] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:38 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x118, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x54, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x633e96cc}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe2b2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xadb1e90}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa440}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x21}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x692ea870}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7bbb}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x869c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x76b6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xda93}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x54ec}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eec}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x43ca}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb8e3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x50af1eeb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59f760f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e06f384}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5045c414}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa171}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b6ca8ad}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e6e59cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1f8250f3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe905}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x118}, 0x1, 0x0, 0x0, 0x881}, 0x4) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 725.096625][ T27] audit: type=1800 audit(1584762758.349:1384): pid=21674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=265 res=0 [ 725.168685][ T27] audit: type=1804 audit(1584762758.379:1385): pid=21674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/35/file0/file0" dev="loop3" ino=265 res=1 [ 725.308340][T21680] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21680 comm=syz-executor.1 [ 725.367234][T21681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21681 comm=syz-executor.1 [ 727.031608][T21687] IPVS: ftp: loaded support on port[0] = 21 [ 727.120271][T21687] chnl_net:caif_netlink_parms(): no params data found [ 727.168546][T21687] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.175756][T21687] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.183821][T21687] device bridge_slave_0 entered promiscuous mode [ 727.193767][T21687] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.200859][T21687] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.208935][T21687] device bridge_slave_1 entered promiscuous mode [ 727.231236][T21687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 727.246938][T21687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 727.271804][T21687] team0: Port device team_slave_0 added [ 727.280529][T21687] team0: Port device team_slave_1 added [ 727.299569][T21687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 727.306634][T21687] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 727.332720][T21687] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 727.347175][T21687] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 727.354431][T21687] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 727.380955][T21687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 727.466129][T21687] device hsr_slave_0 entered promiscuous mode [ 727.522743][T21687] device hsr_slave_1 entered promiscuous mode [ 727.572402][T21687] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 727.579970][T21687] Cannot create hsr debugfs directory [ 727.670349][T21687] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.677508][T21687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 727.684893][T21687] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.691936][T21687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 727.768983][T21687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 727.787639][T10358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 727.796612][T10358] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.804474][T10358] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.813235][T10358] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 727.827514][T21687] 8021q: adding VLAN 0 to HW filter on device team0 [ 727.842459][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 727.850859][T18494] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.858096][T18494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 727.883231][T10358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 727.891791][T10358] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.898917][T10358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 727.911959][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 727.927961][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 727.940688][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 727.961848][T21687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 727.972819][T21687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 727.984662][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 727.993251][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 728.001695][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 728.028827][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 728.038679][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 728.056018][T21687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 728.132082][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 728.141539][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 728.168803][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 728.177495][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 728.186690][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 728.201471][T18494] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 728.211409][T21687] device veth0_vlan entered promiscuous mode [ 728.231678][T21687] device veth1_vlan entered promiscuous mode [ 728.261915][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 728.271424][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 728.280228][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 728.289004][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 728.301154][T21687] device veth0_macvtap entered promiscuous mode [ 728.317200][T21687] device veth1_macvtap entered promiscuous mode [ 728.341210][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 728.351779][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.362687][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 728.373218][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.383052][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 728.393966][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.404125][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 728.414876][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.424922][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 728.435692][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.446653][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 728.457220][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.468411][T21687] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 728.477560][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 728.487273][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 728.495431][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 728.504034][T15615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 728.517159][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 728.527931][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.538715][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 728.558560][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.568686][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 728.579631][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.589494][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 728.600283][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.610219][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 728.620659][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.630518][T21687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 728.640962][T21687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 728.652125][T21687] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 728.660664][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 728.670401][ T3264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:52:42 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="be3900001000f237e6ce3f400ace27e807888b01", @ANYRES32=r6, @ANYBLOB="012001000000100008001c00ef000000"], 0x28}}, 0x0) 03:52:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80084121, &(0x7f0000000040)) 03:52:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r4, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r3, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1a040, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r2}, 0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={r2, 0xd88}, 0x8) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000040)={0x9, 0x0, 0x8, 0x7ff, 0x98000000}, 0xc) r5 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r7, r6, 0x0) sendfile(r5, r6, 0x0, 0x7fffffa7) 03:52:42 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) 03:52:42 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) [ 729.110115][ T27] audit: type=1800 audit(1584762762.359:1386): pid=21709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=266 res=0 [ 729.130629][T21709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80086301, &(0x7f0000000040)) 03:52:42 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) [ 729.210004][ T27] audit: type=1804 audit(1584762762.359:1387): pid=21709 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/93/file0/file0" dev="loop0" ino=266 res=1 03:52:42 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, &(0x7f0000000180)={[{@mode={'mode'}}]}) read(r5, &(0x7f0000000380)=""/233, 0xffbe) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000010080108f1ff80f099952a00", @ANYRES32=r7, @ANYBLOB="012001000000000008001c00ef000000"], 0x28}}, 0x0) [ 729.380296][ T27] audit: type=1800 audit(1584762762.379:1388): pid=21710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16958 res=0 03:52:42 executing program 5: ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)) 03:52:42 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80086601, &(0x7f0000000040)) 03:52:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r4, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r3, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 729.528044][ T27] audit: type=1804 audit(1584762762.409:1389): pid=21710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/36/file0/file0" dev="sda1" ino=16958 res=1 [ 729.628582][T21745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2064 sclass=netlink_route_socket pid=21745 comm=syz-executor.1 [ 729.883268][ T27] audit: type=1800 audit(1584762763.139:1390): pid=21754 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=267 res=0 03:52:43 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') r3 = socket$inet(0x2, 0x8000000003, 0x2f) fcntl$dupfd(r3, 0x0, r3) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x84b, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='auxv\x00') pipe(&(0x7f0000000100)) 03:52:43 executing program 5: ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)) 03:52:43 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80087601, &(0x7f0000000040)) 03:52:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r8) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [{0x2, 0x3}, {0x2, 0x7}, {0x2, 0x4}, {}, {0x2, 0x2}, {}, {0x2, 0x1}], {0x4, 0x1}, [{}, {0x8, 0x6}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x1}, {0x8, 0x4, r4}, {0x8, 0x4, r6}, {0x8, 0x0, r8}], {0x10, 0x7}, {0x20, 0x4}}, 0x9c, 0x2) 03:52:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:43 executing program 5: ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)) [ 730.073594][T21754] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 730.089966][ T27] audit: type=1804 audit(1584762763.229:1391): pid=21764 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir894532607/syzkaller.5ljbrs/94/file0/file0" dev="loop0" ino=267 res=1 03:52:43 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) 03:52:43 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) 03:52:43 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184132, &(0x7f0000000040)) [ 730.204993][ T27] audit: type=1800 audit(1584762763.459:1392): pid=21770 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=268 res=0 03:52:43 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl(r0, 0x40084149, &(0x7f0000000040)) [ 730.342510][ T27] audit: type=1804 audit(1584762763.489:1393): pid=21781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/37/file0/file0" dev="loop3" ino=268 res=1 03:52:43 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_BUFFERS(r7, 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000000c0)=0x200800, 0x4) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:43 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x22, 0x2, 0x2) getpeername$inet(r4, 0x0, 0x0) r5 = socket(0x22, 0x2, 0x2) getpeername$inet(r5, 0x0, 0x0) accept$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:43 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184151, &(0x7f0000000040)) 03:52:43 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)) 03:52:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r6}}}}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x40}}, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r5, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x1c, r7, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x8010) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r8 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 730.781598][ T27] audit: type=1800 audit(1584762764.029:1394): pid=21812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16970 res=0 [ 730.901974][ T27] audit: type=1804 audit(1584762764.059:1395): pid=21802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir229328210/syzkaller.LHmtsf/38/file0/file0" dev="sda1" ino=16970 res=1 [ 730.997725][T21815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) 03:52:44 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80184153, &(0x7f0000000040)) 03:52:44 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)) 03:52:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000001900)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) setrlimit(0xd, &(0x7f00000018c0)={0x101, 0x5}) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0), 0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000001940)={0x0, 0x3}, 0x8) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) sendmsg(r7, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000340)="f871d476885a85f3689d0dac4216a2da83e7173bd57f411ebb4f64ddfea11d150c6bebf610a67e1ba876c8337794b5c0a6c6c31add8188db42d1bb10c41e913bc6f6aa94eaabf3ca8edb8166e4b8f33b4a7f06f0719f0eebe927babea6866ac75a946ba02e08314eab4c72b19e3c9b6faf491c02534197fcbe81d4ac4ddf44113f6c7d400cae72426786c1712a1fa9c505cacc286a612da71fb68611f16ead2ac88f70e1d69f257042c0912f67486947b50346deb54fb03a5bc7cc421137b873efc40ab9d20a33222dbf0348791e77b9139a833654db218a3e0bf93bfd", 0xdd}, {&(0x7f0000000440)="04bbd923f60d33ff4997a3afd9c5aee2cd2fbd89a3dbdc259f170a8319be1ae062df85ae52014b5f39fe99454e2ac219d972870709f23ead9cced272a75dbc4da4f6b1de149b6dba8dd0ba2321acff1f7915c6f269a47c960efdd97940ef577589ea831e1356a550c542d282fa390db5789d1d476d934b1761a900e18cdfa24ee4197af0d95ba6a30f5652f016e368363ab1d44fd7354a4abee1f3c3bb359e93a34f3d09e8224df0a24ca197b483d8195bc14b88b34a6a1006ab6b49f8d61c5e250f6c093b941c613acca206987422", 0xcf}, {&(0x7f0000000540)="05d76f0b57a443a4b301436b984d452918e2062da6674e2bfdfa0a43a52609590e27f98f5d5eefbca4e3904e2a4d2ad151bffd94eb70d3470d08f9b31d00ee7e64d896677b24c64e6121b72168f3cd9c4e32e9389f3d37bf29fcd3f3acbcc308c7867df5a931edfbf96c30aa317801785d019ebc757763c8dd3683ee62cbe990ca982a34f050d92d28f37952a7796abdb99a890b17283e3196db8532cdf55a79fa7503f17575a69e17c263891606274c13a6a2f287b3b56f5642f72eba2635fc55506f1b7961f27434519233f975a126a7e5f65550f2c186146a5770f5445a66691a8b71fe", 0xe5}, {&(0x7f0000000240)="5c66b545bf9f1005563634a614f9ec87114f02eb1167de2c00dea949800588f48a488d023b7defff8634e0a05903f0b555523ddedb4896622c6b239e2a65e922d84ad94e55e49386991bd66bd1c4e4b12dcf033a143018f7fabc202a3c0b", 0x5e}, {&(0x7f0000000640)="ff77a7dde6905e603b78bbd8bee4577dc96920681ef7137a03829972fa0504023a348c679c80cdc29991b118d6f1f044728aa763451284aeb2dcbf47b3825c04dbab6abe6787c2b3c1a65e343ae77ddc01b9273474a928465c", 0x59}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="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", 0xfe}, {&(0x7f00000017c0)="70706aa35873bebb6789fca0db84c57f411614f7b825d27bd35eae8ce6d63d30f6b2e9a16d455c", 0x27}], 0x8}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASEINTERFACE(r5, 0x80045510, &(0x7f0000000040)=0x9) sendfile(r1, r2, 0x0, 0x7fffffb4) 03:52:44 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x806c4120, &(0x7f0000000040)) 03:52:44 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)) 03:52:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:44 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$midi(r3, &(0x7f00000000c0)="33c542d19037359926668bddcee9780613afdea0bbc8194bd686e353", 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r5 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r5, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r6 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x12001}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 03:52:44 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80984120, &(0x7f0000000040)) 03:52:44 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f00000003c0)={0x4, 0x5, 0x0, [{0x5, 0x100, 0x1ff, 0xa0, 0x81, 0x8}, {0x3ff, 0x2, 0x8, 0x9, 0xe0, 0x5, 0x9}, {0x100000001, 0x2, 0x6, 0x2, 0x5, 0x24, 0x40}, {0x10001, 0x0, 0xfffffffffffffffa, 0x5, 0x7f, 0x34, 0x7}, {0xf02, 0x100000001, 0x3, 0x81, 0x10, 0x8, 0x68}]}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup3(r3, r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000020, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r8}}, {@debug={'debug', 0x3d, 0x6}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0x8}}, {@version_u='version=9p2000.u'}, {@version_u='version=9p2000.u'}, {@privport='privport'}, {@cachetag={'cachetag'}}], [{@dont_appraise='dont_appraise'}]}}) sendfile(r1, r2, 0x0, 0x7fffffa7) 03:52:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r2, @ANYBLOB="53077b006bbde6aa"], 0x5}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xffffffff, 0x4) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0xff, 0x0, 0xfe, 0x0, 0x248000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000940), 0x12) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read$FUSE(r5, &(0x7f0000000980), 0x1000) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000000)={0x7f, 0x3f, [0x7e3b, 0xf956, 0x7, 0x2, 0xff7f], 0x8}) [ 731.809591][T21861] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:52:45 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000340)={{0x2, 0x0, @identifier="676b9a74d23c857ed057a859ab8f83c2"}, 0x90, [], "65fe8edbd9c10b8dcb273eb4efd8e349848ba9231e78683443ab228b73d077fd53134f1aaa580a249e68f51a8bbc1d06ace97e4327e1c6f40fbead02c927cd44c2ac483f0b1935ecf037908d1c02948d1fb47b01ad813a0b944c0b423197a4cc6583d8065c0bfcfc5306ffddb7162cfd5f2f7ede294c0ccdaae03a3fc040c3a979e021f55ba1cbdda14d99f19db8923d"}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f0000000000)=0x7ffffffffffffffe, 0x4) splice(0xffffffffffffffff, &(0x7f00000002c0)=0x4, r4, &(0x7f0000000300)=0x80000001, 0x3ff, 0x9) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=r6, @ANYBLOB="0100043051a921b0a7"], 0x28}}, 0x0) 03:52:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb01000000347014ff106efff8", 0xd}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) recvfrom$ax25(r1, &(0x7f0000000040)=""/40, 0x28, 0x100, 0x0, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000140)=0xffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cpuinfo\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000200)={0x6, 0x0, [{0x80000019, 0x9, 0x8000, 0x8, 0x2}, {0x80000000, 0x81, 0x3, 0x9, 0x7ad4}, {0xa, 0x3608, 0x8000, 0x81, 0x40}, {0x0, 0x2, 0x0, 0x1, 0x6}, {0x4, 0xfff, 0x5, 0x7, 0x1ff}, {0xa, 0x10001, 0x8}]}) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x1) 03:52:45 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x81204101, &(0x7f0000000040)) 03:52:45 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) 03:52:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101900, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4000000010001fff000000000000004000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="1bc021438b1ce857472ca6bee6de"], 0x40}}, 0x0) connect$netlink(r4, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc) r6 = socket(0x22, 0x2, 0x2) getpeername$inet(r6, 0x0, 0x0) connect$inet6(r6, &(0x7f0000000280)={0xa, 0x4e20, 0x7, @ipv4={[], [], @remote}, 0x1ff}, 0x1c) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) dup3(r3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) [ 732.172866][ T166] ------------[ cut here ]------------ [ 732.178454][ T166] WARNING: CPU: 0 PID: 166 at drivers/net/geneve.c:1849 geneve_exit_batch_net+0x512/0x5f0 [ 732.188338][ T166] Kernel panic - not syncing: panic_on_warn set ... [ 732.194926][ T166] CPU: 0 PID: 166 Comm: kworker/u4:3 Not tainted 5.6.0-rc6-syzkaller #0 [ 732.203246][ T166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.213347][ T166] Workqueue: netns cleanup_net [ 732.218107][ T166] Call Trace: [ 732.221400][ T166] dump_stack+0x188/0x20d [ 732.225753][ T166] ? geneve_exit_batch_net+0x470/0x5f0 [ 732.231295][ T166] panic+0x2e3/0x75c [ 732.235197][ T166] ? add_taint.cold+0x16/0x16 [ 732.239932][ T166] ? printk+0xba/0xed [ 732.243919][ T166] ? kmsg_dump_rewind_nolock+0xd9/0xd9 [ 732.249378][ T166] ? __warn.cold+0x14/0x35 [ 732.253800][ T166] ? __warn+0xd5/0x1c8 [ 732.257874][ T166] ? geneve_exit_batch_net+0x512/0x5f0 [ 732.263341][ T166] __warn.cold+0x2f/0x35 [ 732.267592][ T166] ? geneve_exit_batch_net+0x512/0x5f0 [ 732.273061][ T166] report_bug+0x27b/0x2f0 [ 732.277467][ T166] do_error_trap+0x12b/0x220 [ 732.282059][ T166] ? geneve_exit_batch_net+0x512/0x5f0 [ 732.287527][ T166] do_invalid_op+0x32/0x40 [ 732.291944][ T166] ? geneve_exit_batch_net+0x512/0x5f0 [ 732.297401][ T166] invalid_op+0x23/0x30 [ 732.301559][ T166] RIP: 0010:geneve_exit_batch_net+0x512/0x5f0 03:52:45 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x8138ae83, &(0x7f0000000040)) 03:52:45 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)) [ 732.307624][ T166] Code: fc 48 c7 c2 c0 3c 80 88 be 2d 00 00 00 48 c7 c7 20 40 80 88 c6 05 c5 b3 b4 05 01 e8 8e 90 ac fc e9 7d fc ff ff e8 7e c4 c5 fc <0f> 0b e9 99 fe ff ff 48 8d 44 24 40 48 89 04 24 e9 c1 fe ff ff e8 [ 732.327223][ T166] RSP: 0018:ffffc90001617b98 EFLAGS: 00010293 [ 732.333288][ T166] RAX: ffff8880a8fd4340 RBX: dffffc0000000000 RCX: ffffffff860eb33e [ 732.341257][ T166] RDX: 0000000000000000 RSI: ffffffff84ac60a2 RDI: ffff888050826070 [ 732.349227][ T166] RBP: ffff88805ae60100 R08: ffff8880a8fd4340 R09: fffffbfff1469d65 [ 732.357193][ T166] R10: fffffbfff1469d64 R11: ffffffff8a34eb27 R12: ffff888093ca6d50 [ 732.365151][ T166] R13: ffff888093ca6d40 R14: ffff888093ca6d40 R15: ffff88805ae601f0 [ 732.373196][ T166] ? unregister_netdevice_queue+0x12e/0x2b0 [ 732.379077][ T166] ? geneve_exit_batch_net+0x512/0x5f0 [ 732.384533][ T166] ? geneve_exit_batch_net+0x512/0x5f0 [ 732.389983][ T166] ? geneve_open+0x1c0/0x1c0 [ 732.394559][ T166] ? gtp_dev_xmit+0x990/0x990 [ 732.399226][ T166] ? geneve_open+0x1c0/0x1c0 [ 732.403806][ T166] ops_exit_list.isra.0+0x103/0x150 [ 732.408993][ T166] cleanup_net+0x511/0xa50 [ 732.413399][ T166] ? unregister_pernet_device+0x70/0x70 [ 732.418930][ T166] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 732.424966][ T166] process_one_work+0x94b/0x1690 [ 732.429899][ T166] ? pwq_dec_nr_in_flight+0x310/0x310 [ 732.435254][ T166] ? do_raw_spin_lock+0x129/0x2e0 [ 732.440277][ T166] worker_thread+0x96/0xe20 [ 732.444780][ T166] ? process_one_work+0x1690/0x1690 [ 732.449962][ T166] kthread+0x357/0x430 [ 732.454013][ T166] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 732.459731][ T166] ret_from_fork+0x24/0x30 [ 732.465819][ T166] Kernel Offset: disabled [ 732.470268][ T166] Rebooting in 86400 seconds..